Sciweavers

2047 search results - page 320 / 410
» Pervasive Computing on Active Networks
Sort
View
CN
2007
179views more  CN 2007»
15 years 4 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CVPR
2012
IEEE
13 years 6 months ago
A flow model for joint action recognition and identity maintenance
We propose a framework that performs action recognition and identity maintenance of multiple targets simultaneously. Instead of first establishing tracks using an appearance mode...
Sameh Khamis, Vlad I. Morariu, Larry S. Davis
ICC
2007
IEEE
154views Communications» more  ICC 2007»
15 years 10 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
ICNP
2009
IEEE
15 years 11 months ago
ESC: Energy Synchronized Communication in Sustainable Sensor Networks
—With advances in energy harvesting techniques, it is now feasible to build sustainable sensor networks (SSN) to support long-term applications. Unlike battery-powered sensor net...
Yu Gu, Ting Zhu, Tian He
KAIS
2011
129views more  KAIS 2011»
14 years 11 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis