Sciweavers

3 search results - page 1 / 1
» Identification of suspicious, unknown event patterns in an e...
Sort
View
DEBS
2007
ACM
13 years 6 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
IJAR
2006
92views more  IJAR 2006»
13 years 5 months ago
Possibilistic clustering approach to trackless ring Pattern Recognition in RICH counters
The pattern recognition problem in Ring Imaging CHerenkov (RICH) counters concerns the identification of an unknown number of rings whose centers and radii are assumed to be unkno...
A. M. Massone, Léonard Studer, Francesco Ma...
ADHOCNETS
2009
Springer
13 years 11 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun