Sciweavers

1291 search results - page 180 / 259
» Intrusion Detection for Distributed Applications
Sort
View
122
Voted
TSMC
2008
138views more  TSMC 2008»
15 years 2 months ago
Fast Diagnosis With Sensors of Uncertain Quality
This correspondence presents an approach to the detection and isolation of component failures in large-scale systems. In the case of sensors that report at rates of 1 Hz or less, t...
Ozgur Erdinc, Craig Brideau, Peter Willett, Thiaga...
129
Voted
IPPS
1998
IEEE
15 years 6 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
137
Voted
ICASSP
2007
IEEE
15 years 9 months ago
Spatiotemporal Algorithm for Background Subtraction
Background modeling and subtraction is a fundamental task in many computer vision and video processing applications. We present a novel probabilistic background modeling and subtr...
S. Derin Babacan, Thrasyvoulos N. Pappas
109
Voted
NOSSDAV
2005
Springer
15 years 8 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
209
Voted
ACMSE
2007
ACM
15 years 6 months ago
Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries
Classification and change detection of land cover types in the remotely sensed images is one of the major applications in remote sensing. This paper presents a hierarchical framew...
Jiang Li