Sciweavers

197 search results - page 20 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
IJCAI
1989
15 years 26 days ago
A Focused, Context-Sensitive Approach to Monitoring
We address two issues which arise in the task of detecting anomalous behavior in complex systems with numerous sensor channels: how to adjust alarm thresholds dynamically, within ...
Richard J. Doyle, Suzanne M. Sellers, David Atkins...
DCOSS
2005
Springer
15 years 5 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
INFOCOM
2009
IEEE
15 years 6 months ago
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
—Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype sys...
Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun...
TIFS
2008
123views more  TIFS 2008»
14 years 11 months ago
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
Abstract--Digital single lens reflex cameras suffer from a wellknown sensor dust problem due to interchangeable lenses that they deploy. The dust particles that settle in front of ...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
OOPSLA
2007
Springer
15 years 5 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley