Sciweavers

5 search results - page 1 / 1
» Distinguishing between single and multi-source attacks using...
Sort
View
CN
2004
95views more  CN 2004»
13 years 5 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
AVSS
2006
IEEE
13 years 11 months ago
A Multi-Class Tracker Using a Scalable Condensation Filter
Tracking systems are typically targeted towards tracking a single class of object. In many real world situations, and in the ETISEO evaluation, it is advantageous to be able to tr...
Simon Denman, Vinod Chandran, Sridha Sridharan, Cl...
ICASSP
2011
IEEE
12 years 9 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
ICASSP
2009
IEEE
13 years 12 months ago
Acoustic fall detection using Gaussian mixture models and GMM supervectors
We present a system that detects human falls in the home environment, distinguishing them from competing noise, by using only the audio signal from a single far-field microphone....
Xiaodan Zhuang, Jing Huang, Gerasimos Potamianos, ...
IEEESCC
2007
IEEE
13 years 11 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...