Sciweavers

496 search results - page 84 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
TIM
2011
134views more  TIM 2011»
13 years 2 months ago
A New Sensory System for Modeling and Tracking Humans Within Industrial Work Cells
—This paper introduces a new sensory system for the 2-D detection, tracking, and prediction of human motions. Using the data acquired through the sensory system, a model of a hum...
Nima Najmaei, Mehrdad R. Kermani, M. A. Al-Lawati
ATAL
2005
Springer
14 years 1 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
EUSAI
2003
Springer
14 years 1 months ago
Applications of Vision-Based Attention-Guided Perceptive Devices to Aware Environments
This paper discusses a computer vision based approach for enhancing a physical environment with machine perception. Using techniques for assessing the distance and orientation of a...
Bogdan Raducanu, Panos Markopoulos
BMCBI
2011
13 years 2 months ago
Detection of viral sequence fragments of HIV-1 subfamilies yet unknown
Background: Methods of determining whether or not any particular HIV-1 sequence stems - completely or in part - from some unknown HIV-1 subtype are important for the design of vac...
Thomas Unterthiner, Anne-Kathrin Schultz, Jan Bull...
NDSS
2008
IEEE
14 years 2 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...