Sciweavers

1291 search results - page 144 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SENSYS
2003
ACM
14 years 2 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
IPPS
2010
IEEE
13 years 6 months ago
KRASH: Reproducible CPU load generation on many-core machines
Abstract--In this article we present KRASH, a tool for reproducible generation of system-level CPU load. This tool is intended for use in shared memory machines equipped with multi...
Swann Perarnau, Guillaume Huard
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
ICDE
2006
IEEE
167views Database» more  ICDE 2006»
14 years 10 months ago
Better Burst Detection
A burst is a large number of events occurring within a certain time window. As an unusual activity, it's a noteworthy phenomenon in many natural and social processes. Many da...
Xin Zhang, Dennis Shasha
MVA
2007
174views Computer Vision» more  MVA 2007»
13 years 10 months ago
A Real-Time Hand Gesture Interface Implemented on a Multi-Core Processor
This paper describes a real-time hand gesture recognition system and its application to VCR remote control. Cascaded classifiers are used to detect a number of different hand pose...
Tsukasa Ike, Nobuhisa Kishikawa, Björn Stenge...