Sciweavers

587 search results - page 94 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
98
Voted
NOSSDAV
2010
Springer
15 years 5 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
100
Voted
NETWORKING
2004
15 years 2 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
MVA
2007
179views Computer Vision» more  MVA 2007»
15 years 3 days ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
85
Voted
ISBI
2008
IEEE
16 years 1 months ago
FMRI brain activity and underlying hemodynamics estimation in a new Bayesian framework
The emerging functional MRI (Magnetic Resonance Imaging), fMRI, imaging modality was developed to obtain non-invasive information regarding the neural processes behind pre-determi...
David M. Afonso, João M. Sanches, Martin H....
114
Voted
MOBICOM
2010
ACM
15 years 25 days ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...