Sciweavers

839 search results - page 121 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
114
Voted
ACIVS
2009
Springer
14 years 10 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 7 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
134
Voted
JIPS
2007
223views more  JIPS 2007»
15 years 19 days ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
BMCBI
2006
190views more  BMCBI 2006»
15 years 24 days ago
VANTED: A system for advanced data analysis and visualization in the context of biological networks
Background: Recent advances with high-throughput methods in life-science research have increased the need for automatized data analysis and visual exploration techniques. Sophisti...
Björn H. Junker, Christian Klukas, Falk Schre...
99
Voted
IPSN
2007
Springer
15 years 7 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu