Sciweavers

325 search results - page 42 / 65
» Qualitative change detection using sensor networks based on ...
Sort
View
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 1 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
HYBRID
2001
Springer
14 years 4 days ago
Diagnosis of Physical Systems with Hybrid Models Using Parametrized Causality
Efficient algorithms exist for fault detection and isolation of physical systems based on functional redundancy. In a qualitative approach, this redundancy can be captured by a tem...
Pieter J. Mosterman
FLAIRS
2010
13 years 10 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
TIFS
2010
127views more  TIFS 2010»
13 years 6 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
LCN
1999
IEEE
13 years 12 months ago
AQuaFWiN: Adaptive QoS Framework for Multimedia in Wireless Networks and Its Comparison with other QoS Frameworks
In a wireless environment, due to topology changes and characteristics of media (interference in radio signals) the bandwidth of a link is unpredictable and possibly very low, the...
Bobby Vandalore, Raj Jain, Sonia Fahmy, Sudhir S. ...