Sciweavers

320 search results - page 47 / 64
» Outlier detection by active learning
Sort
View
IPCCC
2007
IEEE
14 years 2 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
MM
2010
ACM
252views Multimedia» more  MM 2010»
13 years 8 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
ICIAR
2009
Springer
13 years 6 months ago
Invariant Shape Matching for Detection of Semi-local Image Structures
Abstract. Shape features applied to object recognition has been actively studied since the beginning of the field in 1950s and remain a viable alternative to appearance based metho...
Lech Szumilas, Horst Wildenauer, Allan Hanbury
TCIAIG
2010
13 years 3 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 1 days ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song