Sciweavers

708 search results - page 107 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
ADHOC
2007
133views more  ADHOC 2007»
13 years 9 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ARTMED
2004
98views more  ARTMED 2004»
13 years 8 months ago
WeAidU - a decision support system for myocardial perfusion images using artificial neural networks
This paper presents a computer-based decision support system for automated interpretation of diagnostic heart images (called WeAidU), which is made available via the Internet. The...
Mattias Ohlsson
GSN
2009
Springer
140views Sensor Networks» more  GSN 2009»
14 years 1 months ago
Estimation of Pollutant-Emitting Point-Sources Using Resource-Constrained Sensor Networks
We present an algorithm that makes an appropriate use of a Kalman filter combined with a geometric computation with respect to the localisation of a pollutant-emitting point sourc...
Michael Zoumboulakis, George Roussos
CVIU
2010
150views more  CVIU 2010»
13 years 7 months ago
Wireless smart camera network for real-time human 3D pose reconstruction
A multiple-camera system for 3D pose reconstruction is presented. First, body parts of the user are detected. Each camera has a single-instruction multiple-data (SIMD) processor u...
Zoran Zivkovic