Sciweavers

2236 search results - page 369 / 448
» Intrusion detection techniques and approaches
Sort
View
HUMO
2007
Springer
14 years 3 months ago
Multi Person Tracking Within Crowded Scenes
This paper presents a solution to the problem of tracking people within crowded scenes. The aim is to maintain individual object identity through a crowded scene which contains com...
Andrew Gilbert, Richard Bowden
IFIP
2007
Springer
14 years 3 months ago
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
Hybrid networks are networks capable of switching data at multiple levels (optical and IP packet level) by means of multi-service optical switches. As a result of that, huge flows...
Tiago Fioreze, Remco van de Meent, Aiko Pras
MIDDLEWARE
2007
Springer
14 years 3 months ago
A node discovery service for partially mobile sensor networks
Wireless Sensor Networks (WSNs) are challenging types of networks where resources can be scarce. In particular, battery is often a very limited resource and the radio interface is...
Vladimir Dyo, Cecilia Mascolo
VIZSEC
2007
Springer
14 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
DATE
2005
IEEE
96views Hardware» more  DATE 2005»
14 years 2 months ago
DVS for On-Chip Bus Designs Based on Timing Error Correction
On-chip buses are typically designed to meet performance constraints at worst-case conditions, including process corner, temperature, IR-drop, and neighboring net switching patter...
Himanshu Kaul, Dennis Sylvester, David Blaauw, Tre...