Sciweavers

HPCC
2009
Springer
14 years 5 months ago
A Streaming Intrusion Detection System for Grid Computing Environments
Abstract—In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented. Detection mechanisms based on traditional lo...
Matthew Smith, Fabian Schwarzer, Marian Harbach, T...
CDC
2009
IEEE
129views Control Systems» more  CDC 2009»
14 years 5 months ago
Resource allocation for signal detection with active sensors
— We consider the problem of determining the existence of known constant signals over a set of sites, given noisy measurements obtained by a team of active sensors that can switc...
Jerome Le Ny, Michael M. Zavlanos, George J. Pappa...
AVSS
2009
IEEE
14 years 5 months ago
Comparative Evaluation of Stationary Foreground Object Detection Algorithms Based on Background Subtraction Techniques
In several video surveillance applications, such as the detection of abandoned/stolen objects or parked vehicles, the detection of stationary foreground objects is a critical task...
Álvaro Bayona, Juan Carlos San Miguel, Jos&...
PPOPP
2003
ACM
14 years 5 months ago
Hybrid dynamic data race detection
We present a new method for dynamically detecting potential data races in multithreaded programs. Our method improves on the state of the art in accuracy, in usability, and in ove...
Robert O'Callahan, Jong-Deok Choi
ECCV
2004
Springer
14 years 5 months ago
Human Detection Based on a Probabilistic Assembly of Robust Part Detectors
We describe a novel method for human detection in single images which can detect full bodies as well as close-up views in the presence of clutter and occlusion. Humans are modeled ...
Krystian Mikolajczyk, Cordelia Schmid, Andrew Ziss...
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 6 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
ICAPR
2005
Springer
14 years 6 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
IBPRIA
2005
Springer
14 years 6 months ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
ICRA
2005
IEEE
258views Robotics» more  ICRA 2005»
14 years 6 months ago
Fast Line, Arc/Circle and Leg Detection from Laser Scan Data in a Player Driver
— A feature detection system has been developed for real-time identification of lines, circles and people legs from laser range data. A new method suitable for arc/circle detect...
João Xavier, Marco Pacheco, Daniel Castro, ...
ICMCS
2005
IEEE
141views Multimedia» more  ICMCS 2005»
14 years 6 months ago
Events Detection for an Audio-Based Surveillance System
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems ai...
Chloé Clavel, Thibaut Ehrette, Gaël Ri...