Sciweavers

1777 search results - page 240 / 356
» Surveillance Event Detection
Sort
View
PERCOM
2005
ACM
15 years 10 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi
ISI
2005
Springer
15 years 10 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
DATE
2003
IEEE
86views Hardware» more  DATE 2003»
15 years 9 months ago
Cross-Product Functional Coverage Measurement with Temporal Properties-Based Assertions
Temporal specification languages provide an efficient way to express events comprised of complex temporal scenarios. Assertions based on these languages are used to detect viola...
Avi Ziv
ACSAC
2004
IEEE
15 years 8 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
WSC
2007
15 years 6 months ago
Targeted strategies for tuberculosis in areas of high HIV prevalence: a simulation study
We describe the analysis of a discrete event simulation model of tuberculosis (TB) and HIV disease, parameterized to describe the dual epidemics in Harare, Zimbabwe. The HIV epide...
Georgina R. Mellor, Christine S. M. Currie, Elizab...