Sciweavers

2236 search results - page 351 / 448
» Intrusion detection techniques and approaches
Sort
View
EWSN
2004
Springer
14 years 8 months ago
Context-Aware Sensors
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Eiman Elnahrawy, Badri Nath
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 3 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
IROS
2006
IEEE
128views Robotics» more  IROS 2006»
14 years 3 months ago
Improving Data Association in Vision-based SLAM
— This paper presents an approach to vision-based simultaneous localization and mapping (SLAM). Our approach uses the scale invariant feature transform (SIFT) as features and app...
Arturo Gil, Óscar Reinoso, Óscar Mar...
DSN
2005
IEEE
14 years 2 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
SSDBM
2005
IEEE
128views Database» more  SSDBM 2005»
14 years 2 months ago
Fuzzy Decomposition of Spatially Extended Objects
Modern database applications including computer-aided design, multimedia information systems, medical imaging, molecular biology, or geographical information systems impose new re...
Hans-Peter Kriegel, Martin Pfeifle