Sciweavers

888 search results - page 61 / 178
» Digital detective - Bluetooth
Sort
View
ICMLA
2007
15 years 18 days ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli
PR
2002
64views more  PR 2002»
14 years 10 months ago
Spatial-temporal joint probability images for video segmentation
E ective annotation and content-based search for videos in a digital library require a preprocessing step of detecting, locating and classifying scene transitions, i.e., temporal ...
Ze-Nian Li, Xiang Zhong, Mark S. Drew
ICIP
2006
IEEE
16 years 24 days ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 5 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
CCS
2007
ACM
15 years 3 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...