Sciweavers

1310 search results - page 225 / 262
» Modelling and Using Imperfect Context Information
Sort
View
PERVASIVE
2009
Springer
15 years 4 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
AB
2008
Springer
15 years 4 months ago
Local Structure and Behavior of Boolean Bioregulatory Networks
Abstract. A well-known discrete approach to modeling biological regulatory networks is the logical framework developed by R. Thomas. The network structure is captured in an interac...
Heike Siebert
98
Voted
IAT
2007
IEEE
15 years 4 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ICDCSW
2005
IEEE
15 years 3 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani