Sciweavers

2009 search results - page 348 / 402
» Towards Self-Configuring Networks
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 9 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
TKDE
2008
134views more  TKDE 2008»
13 years 9 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
INFOCOM
2010
IEEE
13 years 7 months ago
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and tr...
Saqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini S...
CVPR
2008
IEEE
14 years 11 months ago
A mixed generative-discriminative framework for pedestrian classification
This paper presents a novel approach to pedestrian classification which involves utilizing the synthesized virtual samples of a learned generative model to enhance the classificat...
Markus Enzweiler, Dariu M. Gavrila
ICDE
2009
IEEE
127views Database» more  ICDE 2009»
14 years 11 months ago
SbQA: A Self-Adaptable Query Allocation Process
We present a flexible query allocation framework, called Satisfaction-based Query Allocation (SbQA for short), for distributed information systems where both consumers and provider...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...