Sciweavers

2279 search results - page 257 / 456
» Robust Circle Detection
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 10 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
SIGCOMM
2004
ACM
15 years 10 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
NSDI
2010
15 years 6 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
DICTA
2009
15 years 5 months ago
Improved Simultaneous Computation of Motion Detection and Optical Flow for Object Tracking
Abstract--Object tracking systems require accurate segmentation of the objects from the background for effective tracking. Motion segmentation or optical flow can be used to segmen...
Simon Denman, Clinton Fookes, Sridha Sridharan
BMCBI
2007
145views more  BMCBI 2007»
15 years 4 months ago
The utility of MAS5 expression summary and detection call algorithms
Background: Used alone, the MAS5.0 algorithm for generating expression summaries has been criticized for high False Positive rates resulting from exaggerated variance at low inten...
Stuart D. Pepper, Emma K. Saunders, Laura E. Edwar...