Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,177,781 papers from all fields of science
Search
Sign In
Create Free Account
Linux Intrusion Detection System
Known as:
LIDS
, LinuxIntrusionDetectionSystem
Incomputer security, the Linux Intrusion Detection System (LIDS) is a patch to the Linux kernel and associated administrativetools that enhances the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
AppArmor
Computer security
Linux
Linux Security Modules
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Person Re-identification by Multi-Channel Parts-Based CNN with Improved Triplet Loss Function
De Cheng
,
Yihong Gong
,
Sanping Zhou
,
Jinjun Wang
,
N. Zheng
Computer Vision and Pattern Recognition
2016
Corpus ID: 3332134
Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of…
Expand
Highly Cited
2016
Highly Cited
2016
Model-based teeth reconstruction
Chenglei Wu
,
D. Bradley
,
+4 authors
T. Beeler
ACM Transactions on Graphics
2016
Corpus ID: 16189991
In recent years, sophisticated image-based reconstruction methods for the human face have been developed. These methods capture…
Expand
Highly Cited
2014
Highly Cited
2014
Covariance descriptor based on bio-inspired features for person re-identification and face verification
Bingpeng Ma
,
Yu Su
,
F. Jurie
Image and Vision Computing
2014
Corpus ID: 84297
Highly Cited
2013
Highly Cited
2013
POP: Person Re-identification Post-rank Optimisation
Chunxiao Liu
,
Chen Change Loy
,
S. Gong
,
Guijin Wang
IEEE International Conference on Computer Vision
2013
Corpus ID: 8223206
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce sub optimal rank-list, which…
Expand
Highly Cited
2010
Highly Cited
2010
Person Re-identification Using Spatial Covariance Regions of Human Body Parts
Sławomir Bąk
,
E. Corvée
,
F. Brémond
,
M. Thonnat
7th IEEE International Conference on Advanced…
2010
Corpus ID: 18396474
In many surveillance systems there is a requirement todetermine whether a given person of interest has alreadybeen observed over…
Expand
Highly Cited
2009
Highly Cited
2009
Associating Groups of People
Weishi Zheng
,
S. Gong
,
T. Xiang
British Machine Vision Conference
2009
Corpus ID: 10150893
In a crowded public space, people often walk in groups, either with people they know or strangers. Associating a group of people…
Expand
Highly Cited
2009
Highly Cited
2009
Head Pose Classification in Crowded Scenes
J. Orozco
,
S. Gong
,
T. Xiang
British Machine Vision Conference
2009
Corpus ID: 12719713
We propose a novel technique for head pose classification in crowded public space under poor lighting and in low-resolution video…
Expand
2006
2006
Getting started with the Linux intrusion detection system
I. Habib
2006
Corpus ID: 63397119
With increasing usage of Linux in various computing environments, a lot of security vulnerabilities are being discovered in GNU…
Expand
Highly Cited
1994
Highly Cited
1994
RELAX-IV : a faster version of the RELAX code for solving minimum cost flow problems
D. Bertsekas
,
P. Tseng
,
Decision Systems.
1994
Corpus ID: 3213584
The structure of dual ascent methods is particularly well-suited for taking advantage of good initial dual solutions of minimum…
Expand
Highly Cited
1993
Highly Cited
1993
Distributed representation and analysis of visual motion
Eero P. Simoncelli
1993
Corpus ID: 42586915
The central theme of the thesis is that the failure of image motion algorithms is due primarily to the use of vector fields as a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE