Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
JSAC
2006
128views more  JSAC 2006»
10 years 11 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
JMM2
2006
139views more  JMM2 2006»
10 years 11 months ago
Robust Real-time 3D Detection of Obstructed Head and Hands in Indoors Environments
We address the need for robust detection of obstructed human features in complex environments, with a focus on intelligent surgical UIs. In our setup, real-time detection is used t...
Sébastien Grange, Charles Baur
CVIU
2007
166views more  CVIU 2007»
10 years 11 months ago
Pedestrian detection by means of far-infrared stereo vision
This article presents a stereo system for the detection of pedestrians using far-infrared cameras. Since pedestrian detection in far-infrared images can be difficult in some envir...
Massimo Bertozzi, Alberto Broggi, Claudio Caraffi,...
CORR
2007
Springer
131views Education» more  CORR 2007»
10 years 11 months ago
Bayesian sequential change diagnosis
Sequential change diagnosis is the joint problem of detection and identification of a sudden and unobservable change in the distribution of a random sequence. In this problem, the...
Savas Dayanik, Christian Goulding, H. Vincent Poor
INFORMATICALT
2006
68views more  INFORMATICALT 2006»
10 years 11 months ago
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping
Abstract. This paper presents an application of the Hilbert
Arturas Janusauskas, Vaidotas Marozas, Arunas Luko...
IJDAR
2006
245views more  IJDAR 2006»
10 years 11 months ago
Object count/area graphs for the evaluation of object detection and segmentation algorithms
Evaluation of object detection algorithms is a non-trivial task: a detection result is usually evaluated by comparing the bounding box of the detected object with the bounding box...
Christian Wolf, Jean-Michel Jolion
DSP
2006
10 years 11 months ago
Adaptive multi-modality sensor scheduling for detection and tracking of smart targets
This paper considers the problem of sensor scheduling for the purposes of detection and tracking of "smart" targets. Smart targets are targets that can detect when they ...
Christopher M. Kreucher, Doron Blatt, Alfred O. He...
CORR
2006
Springer
112views Education» more  CORR 2006»
10 years 11 months ago
The Diversity Order of the Semidefinite Relaxation Detector
In this paper, we consider the detection of binary (antipodal) signals transmitted in a spatially multiplexed fashion over a fading multiple-input
Joakim Jalden, Björn E. Ottersten
COMCOM
2006
121views more  COMCOM 2006»
10 years 11 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
BMCBI
2006
127views more  BMCBI 2006»
10 years 11 months ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...
books