Sciweavers

Share
37 search results - page 1 / 8
» Designing an Illegal Mining Detection System based on DinSAR
Sort
View
IGARSS
2010
10 years 11 months ago
Designing an Illegal Mining Detection System based on DinSAR
Satellite Differential Radar Interferometry (DInSAR) has demonstrated its ability for monitoring mine-induced ground subsidence. However, it is still a challenging task to routine...
Zhe Hu, Linlin Ge, Xiaojing Li, Chris Rizos
ICIP
2005
IEEE
12 years 2 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
OOPSLA
2004
Springer
11 years 6 months ago
A framework for detecting, assessing and visualizing performance antipatterns in component based systems
Component-based enterprise systems often suffer from performance issues as a result of poor system design. In this paper, we propose a framework to automatically detect, assess an...
Trevor Parsons
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
12 years 1 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
9 years 3 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
books