Sciweavers

988 search results - page 74 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
TPDS
2008
157views more  TPDS 2008»
13 years 10 months ago
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
Bin Xiao, Hekang Chen, Shuigeng Zhou
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 10 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
KBSE
2005
IEEE
14 years 3 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
CVPR
2001
IEEE
15 years 2 days ago
Learning Similarity Measure for Natural Image Retrieval with Relevance Feedback
A new scheme of learning similarity measure is proposed for content-based image retrieval (CBIR). It learns a boundary that separates the images in the database into two parts. Im...
Guodong Guo, Anil K. Jain, Wei-Ying Ma, HongJiang ...
CVPR
2005
IEEE
15 years 2 days ago
Creating Invariance to "Nuisance Parameters" in Face Recognition
A major goal for face recognition is to identify faces where the pose of the probe is different from the stored face. Typical feature vectors vary more with pose than with identit...
Simon J. D. Prince, James H. Elder