Sciweavers

765 search results - page 66 / 153
» Detecting Anomalies and Intruders
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
15 years 4 months ago
Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments
Abstract— Using autonomous mobile robots to patrol environments for detecting intruders is a topic of increasing relevance for its possible applications. A large part of strategi...
Francesco Amigoni, Nicola Basilico, Nicola Gatti
IROS
2006
IEEE
106views Robotics» more  IROS 2006»
15 years 3 months ago
Where to Build a Door
— A room is a simple polygon with a prespecified point, called the door, on its boundary. Search starts at the door, and must detect any intruder that may be in the room, while ...
John Z. Zhang, Tsunehiko Kameda
CCCG
2006
14 years 11 months ago
An Optimal Solution to Room Search Problem
A room is a simple polygon with a prespecified point, called the door, on its boundary. A search starts at the door and must detect any intruder that may be in the room, while maki...
Binay K. Bhattacharya, John Z. Zhang, Qiaosheng Sh...
IJCGA
2010
99views more  IJCGA 2010»
14 years 8 months ago
Finding All Door Locations that Make a Room Searchable
—A room is a simple polygon with a prespecified point, called the door, on its boundary. Search may be conducted by two guards on the boundary who keep mutual visibility at all ...
Tsunehiko Kameda, John Z. Zhang