Sciweavers

407 search results - page 74 / 82
» A Framework for the Evaluation of Intrusion Detection System...
Sort
View
TMI
2008
88views more  TMI 2008»
13 years 7 months ago
Adaptive SPECT
Abstract--Adaptive imaging systems alter their dataacquisition configuration or protocol in response to the image information received. An adaptive pinhole SPECT system might acqui...
Harrison H. Barrett, L. R. Furenlid, M. Freed, J. ...
CVPR
2011
IEEE
12 years 11 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
CIKM
2004
Springer
14 years 24 days ago
Grammar-based task analysis of web logs
The daily use of Internet-based services is involved with hundreds of different tasks being performed by multiple users. A single task is typically involved with a sequence of Web...
Savitha Srinivasan, Arnon Amir, Prasad M. Deshpand...
SOSP
2005
ACM
14 years 4 months ago
IRON file systems
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit more complex failure modes. We suggest a new fail-partial failure model for disks, ...
Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, N...