Sciweavers

531 search results - page 54 / 107
» A strategy for selecting multiple components
Sort
View
142
Voted
COMCOM
2008
120views more  COMCOM 2008»
15 years 3 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
104
Voted
OSDI
1996
ACM
15 years 5 months ago
A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching
High-performance I/O systems depend on prefetching and caching in order to deliver good performance to applications. These two techniques have generally been considered in isolati...
Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, ...
115
Voted
CVPR
2003
IEEE
16 years 5 months ago
Tracking Appearances with Occlusions
Occlusion is a difficult problem for appearance-based target tracking, especially when we need to track multiple targets simultaneously and maintain the target identities during t...
Ying Wu, Ting Yu, Gang Hua
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 10 months ago
Self-adaptive ant colony optimisation applied to function allocation in vehicle networks
Modern vehicles possess an increasing number of software and hardware components that are integrated in electronic control units (ECUs). Finding an optimal allocation for all comp...
Manuel Förster, Bettina Bickel, Bernd Hardung...
131
Voted
IVC
2008
106views more  IVC 2008»
15 years 3 months ago
Attention links sensing to recognition
This paper presents arguments that explicit strategies for visual attentional selection are important for cognitive vision systems, and shows that a number of proposals currently ...
Albert L. Rothenstein, John K. Tsotsos