Sciweavers

2874 search results - page 475 / 575
» Intrusion Detection: Systems and Models
Sort
View
SI3D
2003
ACM
15 years 5 months ago
Incorporating dynamic real objects into immersive virtual environments
We present algorithms that enable virtual objects to interact with and respond to virtual representations, avatars, of real objects. These techniques allow dynamic real objects, s...
Benjamin Lok, Samir Naik, Mary C. Whitton, Frederi...
CDC
2009
IEEE
189views Control Systems» more  CDC 2009»
15 years 4 months ago
Maximizing aggregated revenue in sensor networks under deadline constraints
Abstract— We study the problem of maximizing the aggregated revenue in sensor networks with deadline constraints. Our model is that of a sensor network that is arranged in the fo...
Srikanth Hariharan, Ness B. Shroff
RAID
2010
Springer
14 years 9 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
MICCAI
2010
Springer
14 years 9 months ago
Biomarkers for Identifying First-Episode Schizophrenia Patients Using Diffusion Weighted Imaging
Recent advances in diffusion weighted MR imaging (dMRI) has made it a tool of choice for investigating white matter abnormalities of the brain and central nervous system. In this w...
Yogesh Rathi, James G. Malcolm, Oleg V. Michailovi...
IJON
1998
158views more  IJON 1998»
14 years 11 months ago
Bayesian Kullback Ying-Yang dependence reduction theory
Bayesian Kullback Ying—Yang dependence reduction system and theory is presented. Via stochastic approximation, implementable algorithms and criteria are given for parameter lear...
Lei Xu