Sciweavers

619 search results - page 9 / 124
» Coalition detection and identification
Sort
View
TISSEC
2008
100views more  TISSEC 2008»
14 years 10 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
EPIA
2009
Springer
15 years 2 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...
ANSS
2001
IEEE
15 years 1 months ago
Fault Identification in Networks by Passive Testing
In this paper, we employ the finite state machine (FSM) model for networks to investigate fault identification using passive testing. First, we introduce the concept of passive te...
Raymond E. Miller, Khaled A. Arisha
ICASSP
2011
IEEE
14 years 1 months ago
Audio identification based on spectral modeling of bark-bands energy and synchronization through onset detection
In this paper, we present for the first time the fingerprint IRCAM system for audio identification in streams. The baseline system relies on a double-nested Short Time Fourier ...
Mathieu Ramona, Geoffroy Peeters
ICPR
2004
IEEE
15 years 11 months ago
A Vision-Based Vehicle Identification System
This paper presents a vision-based vehicle identification system which consists of object extraction, object tracking, occlusion detection and segmentation, and vehicle classifica...
Chung-Lin Huang, Wen-Chieh Liao