Sciweavers

2302 search results - page 54 / 461
» Privacy-preserving Distributed Clustering using Generative M...
Sort
View
ICIP
2008
IEEE
16 years 3 months ago
Motion segmentation and abnormal behavior detection via behavior clustering
We consider a change detection problem in video surveillance applications and propose busy-idle rates, meaningful and easy to compute features, to characterize the behavior profil...
Erhan Baki Ermis, Venkatesh Saligrama, Pierre-Marc...
IWOCA
2009
Springer
134views Algorithms» more  IWOCA 2009»
15 years 8 months ago
Combinatorial Models for Cooperation Networks
Abstract. We analyze special random network models – so-called thickened trees – which are constructed by random trees where the nodes are replaced by local clusters. These obj...
Michael Drmota, Bernhard Gittenberger, Reinhard Ku...
JSS
2006
153views more  JSS 2006»
15 years 1 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
JSAC
2007
107views more  JSAC 2007»
15 years 1 months ago
DESENT: decentralized and distributed semantic overlay generation in P2P networks
Abstract— The current approach in web searching, i.e., centralized search engines, rises issues that question their future applicability: 1) coverage and scalability, 2) freshnes...
Christos Doulkeridis, Kjetil Nørvåg, ...
WSC
2000
15 years 3 months ago
Simulation from non-standard distributions using envelope methods
This paper considers the development of envelope methods as a tool for simulation. Envelope methods are based on the construction of simple envelopes to functions. The proposed en...
Michael J. Evans, Tim B. Swartz