Sciweavers

1804 search results - page 90 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICOST
2011
Springer
14 years 1 months ago
Fall Detection from Depth Map Video Sequences
Falls are one of the major risks for seniors living alone at home. Computer vision systems, which do not require to wear sensors, offer a new and promising solution for fall detec...
Caroline Rougier, Edouard Auvinet, Jacqueline Rous...
IWPC
2007
IEEE
15 years 4 months ago
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views
The use of dynamic information to aid in software understanding is a common practice nowadays. One of the many approaches concerns the comprehension of execution traces. A major i...
Bas Cornelissen, Danny Holten, Andy Zaidman, Leon ...
JMLR
2008
148views more  JMLR 2008»
14 years 10 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 5 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
15 years 10 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden