Sciweavers

2236 search results - page 265 / 448
» Intrusion detection techniques and approaches
Sort
View
CIVR
2006
Springer
121views Image Analysis» more  CIVR 2006»
14 years 2 months ago
Finding Faces in Gray Scale Images Using Locally Linear Embeddings
The problem of face detection remains challenging because faces are non-rigid objects that have a high degree of variability with respect to head rotation, illumination, facial exp...
Samuel Kadoury, Martin D. Levine
IJCV
1998
98views more  IJCV 1998»
13 years 10 months ago
Exploiting Discontinuities in Optical Flow
Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detect...
William B. Thompson
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 5 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
INFOCOM
2006
IEEE
14 years 4 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
DKE
2011
230views Education» more  DKE 2011»
13 years 5 months ago
Supporting concurrent ontology development: Framework, algorithms and tool
We propose a novel approach to facilitate the concurrent development of ontologies by different groups of experts. Our approach adapts Concurrent Versioning, a successful paradigm...
Ernesto Jiménez-Ruiz, Bernardo Cuenca Grau,...