Sciweavers

6137 search results - page 991 / 1228
» Securing Collaborative Applications
Sort
View
ISNN
2005
Springer
15 years 7 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
ISVC
2005
Springer
15 years 7 months ago
Mining Paths of Complex Crowd Scenes
The Ambient Intelligence (AmI) paradigm requires a robust interpretation of people actions and behaviour and a way for automatically generating persistent spatial-temporal models o...
Beibei Zhan, Paolo Remagnino, Sergio A. Velastin
IWANN
2005
Springer
15 years 7 months ago
Face Recognition System Based on PCA and Feedforward Neural Networks
Face recognition is one of the most important image processing research topics which is widely used in personal identification, verification and security applications. In this pape...
Alaa Eleyan, Hasan Demirel
NOSSDAV
2005
Springer
15 years 7 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
OOPSLA
2005
Springer
15 years 7 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst