Sciweavers

1424 search results - page 171 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
MUC
1991
15 years 5 months ago
University of Massachusetts: description of the CIRCUS system as used for MUC-3
ind this work was to extract a relatively abstract level of information from each sentence , using only a limited vocabulary that was hand-crafted to handle a restricted set of tar...
Wendy G. Lehnert, Claire Cardie, David Fisher, Ell...
ICCV
2005
IEEE
15 years 7 months ago
Fusing Points and Lines for High Performance Tracking
This paper addresses the problem of real-time 3D modelbased tracking by combining point-based and edge-based tracking systems. We present a careful analysis of the properties of t...
Edward Rosten, Tom Drummond
ISBI
2008
IEEE
16 years 2 months ago
System sensitivity in preclinical small animal imaging
Preclinical small animal imaging is an important tool at the disposition of biological researchers. While the range of studies performed by non-invasive preclinical imaging is gre...
Arion-Xenofon Chatziioannou, Nicolas A. Karakatsan...
IPSN
2009
Springer
15 years 8 months ago
Application-informed radio duty-cycling in a re-taskable multi-user sensing system
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we c...
Omprakash Gnawali, Jongkeun Na, Ramesh Govindan
ACSC
2006
IEEE
15 years 7 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi