Sciweavers

75 search results - page 9 / 15
» Potential Fire Detection based on Kalman-driven Change Detec...
Sort
View
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 11 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
ESEC
1997
Springer
14 years 4 days ago
Applying Static Analysis to Software Architectures
Abstract. In this paper we demonstrate how static concurrency analysis techniques can be used to verify application-specific properties of an architecture description. Specifically...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke,...
CSREASAM
2009
13 years 9 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
14 years 13 days ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
ICPR
2004
IEEE
14 years 9 months ago
Facial Image Retrieval Based on Demographic Classification
In this paper we propose a novel method for demographic classification and present an image retrieval system that can retrieve facial images by demographic information that includ...
Bo Wu, Chang Huang, Haizhou Ai