Sciweavers

631 search results - page 50 / 127
» An experimental evaluation of continuous testing during deve...
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ICPR
2002
IEEE
14 years 25 days ago
Pen Pressure Features for Writer-Independent On-Line Handwriting Recognition Based on Substroke HMM
This paper discusses the use of pen pressure as a feature in writer-independent on-line handwriting recognition. We propose two kinds of features related to pen pressure: one is t...
Mitsuru Nakai, Takashi Sudo, Hiroshi Shimodaira, S...
AHSWN
2010
103views more  AHSWN 2010»
13 years 8 months ago
Efficient Data Retrieving in Distributed Data-streaming Environments
In a potential distributed application, Automobile Tracking System (ATS), automobile location data is continuously generated, kept in a distributed manner. As large amount of traff...
Jinsong Han, Jun Miao, Jizhong Zhao, Jinpeng Huai,...
CSE
2009
IEEE
14 years 2 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
EICS
2009
ACM
14 years 17 days ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...