Sciweavers

877 search results - page 170 / 176
» Intrusion detection systems as evidence
Sort
View
CVPR
2007
IEEE
16 years 1 months ago
Kernel-Based 3D Tracking
We present a computer vision system for robust object tracking in 3D by combining evidence from multiple calibrated cameras. This kernel-based 3D tracker is automatically bootstra...
Ambrish Tyagi, Mark A. Keck, James W. Davis, Geras...
ICPR
2004
IEEE
16 years 24 days ago
A Strongly Coupled Architecture for Contextual Object and Scene Identification
The context-centered approach to object detection and recognition is based on the intuition that the contextual information of real-world scenes provides relevant information for ...
James J. Clark, Tina Ehtiati
ICSE
2003
IEEE-ACM
15 years 11 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 6 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....