Sciweavers

5525 search results - page 981 / 1105
» Verification of Model Transformations
Sort
View
GLOBECOM
2008
IEEE
15 years 7 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
116
Voted
ICDM
2008
IEEE
230views Data Mining» more  ICDM 2008»
15 years 7 months ago
Clustering Distributed Time Series in Sensor Networks
Event detection is a critical task in sensor networks, especially for environmental monitoring applications. Traditional solutions to event detection are based on analyzing one-sh...
Jie Yin, Mohamed Medhat Gaber
ICIP
2008
IEEE
15 years 7 months ago
Localized and computationally efficient approach to shift-variant image deblurring
A new localized and computationally efficient approach is presented for shift/space-variant image restoration. Unlike conventional approaches, it models shift-variant blurring in...
Murali Subbarao, Youn-sik Kang, Satyaki Dutta, Xue...
114
Voted
ICPP
2008
IEEE
15 years 7 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
ICPR
2008
IEEE
15 years 7 months ago
A novel method for real-time multiple moving targets detection from moving IR camera
This paper presents a novel method for detecting multiple moving targets in real-time from infrared (IR) image sequences collected by an airborne IR camera. This novel method is b...
Fenghui Yao, Ali Sekmen, Mohan Malkani