Sciweavers

24 search results - page 5 / 5
» An Improved Method for GPS-Based Network Position Location i...
Sort
View
CCS
2007
ACM
13 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
RECOMB
2008
Springer
14 years 6 months ago
Integrating Sequence and Topology for Efficient and Accurate Detection of Horizontal Gene Transfer
Abstract. One phylogeny-based approach to horizontal gene transfer (HGT) detection entails comparing the topology of a gene tree to that of the species tree, and using their differ...
Cuong Than, Guohua Jin, Luay Nakhleh
BSN
2009
IEEE
145views Sensor Networks» more  BSN 2009»
14 years 17 days ago
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...
TCSV
2002
139views more  TCSV 2002»
13 years 5 months ago
Localizing and segmenting text in images and videos
Many images--especially those used for page design on web pages--as well as videos contain visible text. If these text occurrences could be detected, segmented, and recognized auto...
Rainer Lienhart, Axel Wernicke