Sciweavers

2346 search results - page 409 / 470
» Tactile Change Detection
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
14 years 4 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
MCM
2010
14 years 4 months ago
Electromagnetic interrogation and the Doppler shift using the method of mappings
We consider the electromagnetic detection of hidden moving or oscillating conductive targets. The resulting mathematical problem involves computation of a Doppler shift for an ele...
H. T. Banks, Shuhua Hu, W. Clayton Thompson
PVLDB
2010
111views more  PVLDB 2010»
14 years 4 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
TIP
2010
119views more  TIP 2010»
14 years 4 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
TITS
2010
118views Education» more  TITS 2010»
14 years 4 months ago
Vision-Based Infotainment User Determination by Hand Recognition for Driver Assistance
We present a novel real-time computer-vision system that robustly discriminates which of the front-row seat occupants is accessing the infotainment controls. The knowledge of who i...
Shinko Y. Cheng, Mohan M. Trivedi