Sciweavers

6434 search results - page 976 / 1287
» Model Transformations with Reference Models
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
SUTC
2006
IEEE
15 years 10 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
ICPR
2010
IEEE
15 years 10 months ago
Multiresolution Analysis of 3D Images Based on Discrete Distortion
We consider a model of a 3D image obtained by discretizing it into a multiresolution tetrahedral mesh known as a hierarchy of diamonds. This model enables us to extract crack-free...
Kenneth Weiss, Mohammed Mostefa Mesmoudi, L. De Fl...
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Eye Detection Under Unconstrained Background by the Terrain Feature
Locating eyes in face images is an important step for automatic face analysis and recognition. In this paper, we present a novel approach for eye detection without finding the fa...
Jun Wang, Lijun Yin
INFOCOM
2005
IEEE
15 years 10 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...