Sciweavers

502 search results - page 70 / 101
» A Framework for Activity Recognition and Detection of Unusua...
Sort
View
ICMI
2009
Springer
138views Biometrics» more  ICMI 2009»
14 years 3 months ago
Dialog in the open world: platform and applications
We review key challenges of developing spoken dialog systems that can engage in interactions with one or multiple participants in relatively unconstrained environments. We outline...
Dan Bohus, Eric Horvitz
ICSM
2009
IEEE
14 years 3 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
INFOCOM
2008
IEEE
14 years 3 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni
COMPSAC
2005
IEEE
14 years 2 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 8 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin