Sciweavers

551 search results - page 33 / 111
» Preventing existence
Sort
View
PERCOM
2009
ACM
15 years 6 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
AVSS
2007
IEEE
15 years 6 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
MODELLIERUNG
2010
15 years 1 months ago
A Change Metamodel for the Evolution of MOF-Based Metamodels
: The evolution of software systems often produces incompatibilities with existing data and applications. To prevent incompatibilities, changes have to be wellplanned, and develope...
Erik Burger, Boris Gruschko
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
16 years 11 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
EDBT
2004
ACM
94views Database» more  EDBT 2004»
15 years 12 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang