Sciweavers

41 search results - page 8 / 9
» Behavior monitoring through automatic analysis of video sequ...
Sort
View
RAID
2010
Springer
14 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
FGR
2002
IEEE
197views Biometrics» more  FGR 2002»
15 years 2 months ago
Robust Full-Motion Recovery of Head by Dynamic Templates and Re-Registration Techniques
This paper presents a method to recover the full-motion (3 rotations and 3 translations) of the head from an input video using a cylindrical head model. Given an initial reference...
Jing Xiao, Takeo Kanade, Jeffrey F. Cohn
SIGCOMM
2003
ACM
15 years 3 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
AROBOTS
2002
131views more  AROBOTS 2002»
14 years 9 months ago
Automated Derivation of Primitives for Movement Classification
Abstract. We describe a new method for representing human movement compactly, in terms of a linear superimposition of simpler movements termed primitives. This method is a part of ...
Ajo Fod, Maja J. Mataric, Odest Chadwicke Jenkins
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
15 years 4 months ago
A high-resolution 3D dynamic facial expression database
Face information processing relies on the quality of data resource. From the data modality point of view, a face database can be 2D or 3D, and static or dynamic. From the task poi...
Lijun Yin, Xiaochen Chen, Yi Sun, Tony Worm, Micha...