Sciweavers

4299 search results - page 685 / 860
» Concurrent Test Generation
Sort
View
133
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
108
Voted
AVSS
2005
IEEE
15 years 9 months ago
Performance evaluation of event detection solutions: the CREDS experience
In video surveillance projects, automatic and realtime event detection solutions are required to guarantee an efficient and cost-effective use of the infrastructure. Many solution...
Francesco Ziliani, Sergio A. Velastin, Fatih Porik...
126
Voted
CEC
2005
IEEE
15 years 9 months ago
A study on polynomial regression and Gaussian process global surrogate model in hierarchical surrogate-assisted evolutionary alg
This paper presents a study on Hierarchical Surrogate-Assisted Evolutionary Algorithm (HSAEA) using different global surrogate models for solving computationally expensive optimiza...
Zongzhao Zhou, Yew-Soon Ong, My Hanh Nguyen, Dudy ...
CRV
2005
IEEE
181views Robotics» more  CRV 2005»
15 years 9 months ago
Video with Ground-Truth for Validation of Visual Registration, Tracking and Navigation Algorithms
A fundamental task in computer vision is that of determining the position and orientation of a moving camera relative to an observed object or scene. Many such visual tracking alg...
Rustam Stolkin, Alistair Greig, John Gilby
136
Voted
DSRT
2005
IEEE
15 years 9 months ago
A Simple Distributed Simulation Architecture for Emergency Response Exercises
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...
Dennis McGrath, Amy Hunt, Marion Bates