Sciweavers

2236 search results - page 109 / 448
» Intrusion detection techniques and approaches
Sort
View
GLOBECOM
2006
IEEE
15 years 4 months ago
Voice Activity Detection for VoIP-An Information Theoretic Approach
— Voice enabled applications over the Internet are rapidly gaining popularity. Reducing the total bandwidth requirement can make a non-trivial difference for the subscribers havi...
R. Venkatesha Prasad, R. Muralishankar, S. Vijay, ...
BROADNETS
2006
IEEE
15 years 4 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
AAAI
2010
14 years 11 months ago
A Layered Approach to People Detection in 3D Range Data
People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task difficult is that the appea...
Luciano Spinello, Kai Oliver Arras, Rudolph Triebe...
CVPR
2000
IEEE
15 years 2 months ago
An Effective Approach to Detect Lesions in Color Retinal Images
Diabetic-related eye diseases are the most common cause of blindness in the world. So far the most effective treatment for these eye diseases is early detection through regular sc...
Huan Wang, Wynne Hsu, Kheng Guan Goh, Mong-Li Lee
DSN
2006
IEEE
15 years 1 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...