Sciweavers

78 search results - page 8 / 16
» Event Detection in Multilevel Secure Active Databases
Sort
View
ER
2006
Springer
96views Database» more  ER 2006»
15 years 1 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
TKDE
2008
134views more  TKDE 2008»
14 years 9 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
UCS
2007
Springer
15 years 3 months ago
Instant Learning Sound Sensor: Flexible Real-World Event Recognition System for Ubiquitous Computing
We propose a smart sound sensor for building context-aware systems that instantly learn and detect events from various kinds of everyday sounds and environmental noise by using sma...
Yuya Negishi, Nobuo Kawaguchi
MM
2010
ACM
252views Multimedia» more  MM 2010»
14 years 9 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...