Sciweavers

90 search results - page 5 / 18
» Tracking User Mobility to Detect Suspicious Behavior.
Sort
View
AVI
2004
13 years 8 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti
CRV
2005
IEEE
272views Robotics» more  CRV 2005»
13 years 9 months ago
Real-Time Video Surveillance with Self-Organizing Maps
In this paper, we present an approach for video surveillance involving (a) moving object detection, (b) tracking and (c) normal/abnormal event recognition. The detection step uses...
Mohamed Dahmane, Jean Meunier
IWIA
2005
IEEE
14 years 29 days ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
MASS
2010
157views Communications» more  MASS 2010»
13 years 5 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
CHI
2009
ACM
14 years 8 months ago
UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits
The greatest contributor of CO2 emissions in the average American household is personal transportation. Because transportation is inherently a mobile activity, mobile devices are ...
Jon Froehlich, Tawanna Dillahunt, Predrag V. Klasn...