Sciweavers

458 search results - page 66 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
P2P
2009
IEEE
101views Communications» more  P2P 2009»
14 years 5 months ago
Monitoring and Management of Structured Peer-to-Peer Systems
The peer-to-peer paradigm shows the potential to provide the same functionality and quality like client/server based systems, but with much lower costs. In order to control the qu...
Kalman Graffi, Dominik Stingl, Julius Rueckert, Al...
MLMI
2004
Springer
14 years 4 months ago
A Hierarchical System for Recognition, Tracking and Pose Estimation
This paper presents a new system for recognition, tracking and pose estimation of people in video sequences. It is based on the wavelet transform from the upper body part and uses ...
Philipp Zehnder, Esther Koller-Meier, Luc J. Van G...
INTERSPEECH
2010
13 years 5 months ago
Regularized-MLLR speaker adaptation for computer-assisted language learning system
In this paper, we propose a novel speaker adaptation technique, regularized-MLLR, for Computer Assisted Language Learning (CALL) systems. This method uses a linear combination of ...
Dean Luo, Yu Qiao, Nobuaki Minematsu, Yutaka Yamau...
EUROPAR
2000
Springer
14 years 2 months ago
Design and Evaluation of a Compiler-Directed Collective I/O Technique
Abstract. Current approaches to parallel I/O demand extensive user effort to obtain acceptable performance. This is in part due to difficulties in understanding the characteristics...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
DAS
2006
Springer
14 years 2 months ago
Semi-automatic Ground Truth Generation for Chart Image Recognition
While research on scientific chart recognition is being carried out, there is no suitable standard that can be used to evaluate the overall performance of the chart recognition res...
Li Yang, Weihua Huang, Chew Lim Tan