Sciweavers

8177 search results - page 1389 / 1636
» Detecting System Emulators
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 4 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JSAC
2006
181views more  JSAC 2006»
15 years 4 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
TCSV
2008
107views more  TCSV 2008»
15 years 4 months ago
Person Surveillance Using Visual and Infrared Imagery
This paper presents a methodology for analyzing multimodal and multiperspective systems for person surveillance. Using an experimental testbed consisting of two color and two infra...
Stephen J. Krotosky, Mohan M. Trivedi
TCSV
2008
277views more  TCSV 2008»
15 years 4 months ago
Automatic Single View-Based 3-D Face Synthesis for Unsupervised Multimedia Applications
Abstract--Various 3-D face synthesis techniques have been proposed and extensively used in many applications. Compared with others, single view-based face synthesis technology allo...
Yun Sheng, Abdul H. Sadka, Ahmet M. Kondoz
BMCBI
2005
110views more  BMCBI 2005»
15 years 4 months ago
Discovery of protein-protein interactions using a combination of linguistic, statistical and graphical information
Background: The rapid publication of important research in the biomedical literature makes it increasingly difficult for researchers to keep current with significant work in their...
James W. Cooper, Aaron Kershenbaum
« Prev « First page 1389 / 1636 Last » Next »