Sciweavers

2236 search results - page 303 / 448
» Intrusion detection techniques and approaches
Sort
View
KI
2007
Springer
14 years 4 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox
VTC
2006
IEEE
14 years 4 months ago
Group-Based Linear Parallel Interference Cancellation for DS-CDMA Systems
— The increase in the demand for voice and data wireless services creates a need for a more efficient use of the available bandwidth. Current and future generations cellular sys...
Benoit Pelletier, Benoît Champagne
IWSOS
2009
Springer
14 years 2 months ago
Self-management of Routing on Human Proximity Networks
Abstract. Many modern network applications, including sensor networks and MANETs, have dynamic topologies that reflect processes occurring in the outside world. These dynamic proc...
Graham Williamson, Davide Cellai, Simon A. Dobson,...
AINA
2007
IEEE
14 years 2 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
CW
2004
IEEE
14 years 2 months ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi