Sciweavers

2236 search results - page 137 / 448
» Intrusion detection techniques and approaches
Sort
View
ACIVS
2009
Springer
15 years 4 months ago
Multiple Human Tracking in High-Density Crowds
Abstract. In this paper, we present a fully automatic approach to multiple human detection and tracking in high density crowds in the presence of extreme occlusion. Human detection...
Irshad Ali, Matthew N. Dailey
ISW
2005
Springer
15 years 3 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
ISVC
2005
Springer
15 years 3 months ago
Comparing Sphere-Tree Generators and Hierarchy Updates for Deformable Objects Collision Detection
Abstract. This paper presents a quantitative evaluation of the accuracy of different sphere-tree construction methods when they are used in deformable bodies. The methods evaluate...
M. Garcia, S. Bayona, Pablo Toharia, C. Mendoza
NETWORKING
2004
14 years 11 months ago
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
If efficient network analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks. In this paper...
Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannu...
TIP
1998
116views more  TIP 1998»
14 years 10 months ago
Line and boundary detection in speckle images
—This paper considers the problem of detecting lines in speckle imagery, such as that produced by synthetic aperture radar (SAR) or ultrasound techniques. Using the physical prin...
Richard N. Czerwinski, Douglas L. Jones, William D...