Sciweavers

706 search results - page 100 / 142
» Reporting Flock Patterns
Sort
View
ETRICS
2006
14 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
AIPS
2008
14 years 7 days ago
Planning for Modular Printers: Beyond Productivity
This paper reports our experience extending an on-line printer controller based on AI planning to handle two significant features of this commercially important domain: execution ...
Minh Binh Do, Wheeler Ruml, Rong Zhou
ACMACE
2008
ACM
13 years 12 months ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång
CEAS
2008
Springer
13 years 12 months ago
Social Honeypots: Making Friends With A Spammer Near You
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
Steve Webb, James Caverlee, Calton Pu
ECCV
2006
Springer
13 years 12 months ago
Robust Face Alignment Based on Hierarchical Classifier Network
Abstract. Robust face alignment is crucial for many face processing applications. As face detection only gives a rough estimation of face region, one important problem is how to al...
Li Zhang, Haizhou Ai, Shihong Lao