Sciweavers

1777 search results - page 263 / 356
» Surveillance Event Detection
Sort
View
123
Voted
SEC
2008
15 years 5 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
116
Voted
WSC
2004
15 years 5 months ago
Assessing Obstacle Location Accuracy in the Remus Unmanned Underwater Vehicle
Navy personnel use the REMUS unmanned underwater vehicle to search for submerged objects. Navigation inaccuracies lead to errors in predicting the location of objects and thus inc...
Timothy E. Allen, Arnold H. Buss, Susan M. Sanchez
CCR
2008
113views more  CCR 2008»
15 years 3 months ago
Practical issues with using network tomography for fault diagnosis
This paper investigates the practical issues in applying network tomography to monitor failures. We outline an approach for selecting paths to monitor, detecting and confirming th...
Yiyi Huang, Nick Feamster, Renata Teixeira
JDCTA
2008
128views more  JDCTA 2008»
15 years 3 months ago
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Haining Lee, Jaeil Park, Peom Park, Dongmin Shin
108
Voted
VC
2008
99views more  VC 2008»
15 years 3 months ago
Minimizing probable collision pairs searched in interactive animation authoring
Animation authoring involves an author's interaction with a scene, resulting in varying scene complexity for a given animation sequence. In such a varying environment, detecti...
Parag Agarwal, Srinivas Rajagopalan, B. Prabhakara...