Sciweavers

1804 search results - page 106 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICCV
2001
IEEE
16 years 1 days ago
Improving AR using Shadows Arising from Natural Illumination Distribution in Video Sequences
In this paper, we propose a method for generating realistic shadows of virtual objects inserted into a real video sequence. Our aim is to improve and extend the work of [1], which...
Taeone Kim, Yongduek Seo, Ki-Sang Hong
IJCV
2008
188views more  IJCV 2008»
14 years 10 months ago
Partial Linear Gaussian Models for Tracking in Image Sequences Using Sequential Monte Carlo Methods
The recent development of Sequential Monte Carlo methods (also called particle filters) has enabled the definition of efficient algorithms for tracking applications in image sequen...
Elise Arnaud, Étienne Mémin
RAID
2007
Springer
15 years 4 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 10 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
FGR
2011
IEEE
205views Biometrics» more  FGR 2011»
14 years 1 months ago
High resolution face sequences from a PTZ network camera
Abstract— We propose here to acquire high resolution sequences of a person’s face using a pan-tilt-zoom (PTZ) network camera. This capability should prove helpful in forensic a...
Thang Ba Dinh, Nam Vo, Gérard G. Medioni