Sciweavers

5123 search results - page 960 / 1025
» Performance and Security Tradeoff
Sort
View
TIFS
2008
149views more  TIFS 2008»
14 years 10 months ago
Using One-Class SVMs and Wavelets for Audio Surveillance
This paper presents a procedure aimed at recognizing environmental sounds for surveillance and security applications. We propose to apply One-Class Support Vector Machines (1-SVMs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...
TKDE
2008
134views more  TKDE 2008»
14 years 10 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
68
Voted
TMC
2008
90views more  TMC 2008»
14 years 10 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
TPDS
2008
202views more  TPDS 2008»
14 years 10 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
85
Voted
JMM2
2007
122views more  JMM2 2007»
14 years 10 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma