Sciweavers

197 search results - page 21 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 1 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
15 years 24 days ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
TKDE
2008
134views more  TKDE 2008»
14 years 11 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
NIPS
2008
15 years 1 months ago
Probabilistic detection of short events, with application to critical care monitoring
We describe an application of probabilistic modeling and inference technology to the problem of analyzing sensor data in the setting of an intensive care unit (ICU). In particular...
Norm Aleks, Stuart Russell, Michael G. Madden, Dia...
DCOSS
2005
Springer
15 years 5 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan