Sciweavers

2990 search results - page 159 / 598
» Thresholding for Change Detection
Sort
View
ACSW
2006
13 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
IROS
2009
IEEE
114views Robotics» more  IROS 2009»
14 years 4 months ago
A Distributed boundary detection algorithm for multi-robot systems
— We describe a distributed boundary detection algorithm suitable for use on multi-robot systems with dynamic network topologies. We assume that each robot has access to its loca...
James McLurkin, Erik D. Demaine
ISCAS
2005
IEEE
171views Hardware» more  ISCAS 2005»
14 years 3 months ago
Compressed-domain fall incident detection for intelligent home surveillance
—This paper presents a compressed-domain fall incident detection scheme for intelligent home surveillance applications. For object extraction, global motion parameters are estima...
Chia-Wen Lin, Zhi-Hong Ling, Yuan-Cheng Chang, Chu...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 10 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
CIDM
2007
IEEE
14 years 4 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal