Sciweavers

799 search results - page 156 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
MEDIAFORENSICS
2010
13 years 9 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
PAMI
2008
189views more  PAMI 2008»
13 years 7 months ago
A Marked Point Process of Rectangles and Segments for Automatic Analysis of Digital Elevation Models
This work presents a framework for automatic feature extraction from images using stochastic geometry. Features in images are modeled as realizations of a spatial point process of ...
Mathias Ortner, Xavier Descombes, Josiane Zerubia
AROBOTS
2010
180views more  AROBOTS 2010»
13 years 7 months ago
Reactive direction control for a mobile robot: a locust-like control of escape direction emerges when a bilateral pair of model
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...
IPSN
2007
Springer
14 years 1 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
14 years 23 hour ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu