Sciweavers

1777 search results - page 197 / 356
» Surveillance Event Detection
Sort
View
IWIA
2005
IEEE
15 years 9 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
MOBIHOC
2003
ACM
16 years 3 months ago
ESRT: event-to-sink reliable transport in wireless sensor networks
Wireless sensor networks (WSN) are event based systems that rely on the collective effort of several microsensor nodes. Reliable event detection at the sink is based on collective...
Yogesh Sankarasubramaniam, Özgür B. Akan...
RAID
2007
Springer
15 years 9 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
144
Voted
ICARCV
2006
IEEE
313views Robotics» more  ICARCV 2006»
15 years 9 months ago
GestureCam: A Smart Camera for Gesture Recognition and Gesture-Controlled Web Navigation
– Smart camera, or an intelligent camera, is an embedded vision system which captures and processes image to extract application-specific information in real time. Smart cameras ...
Yu Shi, Ronnie Taib, Serge Lichman
137
Voted
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 4 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...