Sciweavers

619 search results - page 8 / 124
» Coalition detection and identification
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 10 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
ICC
2007
IEEE
15 years 4 months ago
A Proposal of Finger Identification Scheme Employing Intra-Body Communications
—The Intra-Body Communication method attracted more attention since the development of ubiquitous communication. IBC is the technology to use the human body as communication tran...
Nao Kobayashi, Jordi Agud Ruiz, Shigeru Shimamoto
ICPR
2002
IEEE
15 years 11 months ago
Video Fade Detection by Discrete Line Identification
The video segmentation problem can be regarded as a problem of detecting the fundamental video units (shots). Due to different ways of linking two consecutive shots this task turn...
Arnaldo de Albuquerque Araújo, Michel Coupr...
68
Voted
ICASSP
2008
IEEE
15 years 4 months ago
Target detection and identification using canonical correlation analysis and subspace partitioning
We present a data-driven approach for target detection and identification based on a linear mixture model. Our aim is to determine the existence of certain targets in a mixture w...
Wei Wang 0018, Tülay Adali, Darren Emge
ICIP
2006
IEEE
15 years 11 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu