Sciweavers

784 search results - page 97 / 157
» What would they think
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
AINA
2008
IEEE
14 years 2 months ago
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...
CISS
2008
IEEE
14 years 2 months ago
Unsupervised distributional anomaly detection for a self-diagnostic speech activity detector
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
Nash M. Borges, Gerard G. L. Meyer
ICIP
2008
IEEE
14 years 2 months ago
Gradual transition detection using color coherence and other criteria in a video shot meta-segmentation framework
Shot segmentation provides the basis for almost all high-level video content analysis approaches, validating it as one of the major prerequisites for efficient video semantic ana...
Efthymia Tsamoura, Vasileios Mezaris, Ioannis Komp...
PIMRC
2008
IEEE
14 years 2 months ago
A resource allocation scheme to achieve fairness in TH-UWB sensor networks with near-far effects
— The inherent near-far effect in wireless networks causes nodes that are further away from the receiver to suffer from throughput degradation, as packets from nodes that are nea...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Hwee-X...