Sciweavers

458 search results - page 75 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
IAT
2008
IEEE
14 years 4 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
MOBISYS
2005
ACM
14 years 9 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
PDPTA
2007
13 years 11 months ago
Mobile Thin-Client System with Fault Tolerance and Scalability by "HTTP-FUSE-KNOPPIX-BOX"
We have developed a mobile thin-client server named ”HTTP-FUSE-KNOPPIX-BOX” that incorporates mechanisms for increasing performance, distributing load, and providing fault tole...
Jun Kanai, Mitaro Namiki, Kuniyasu Suzaki, Toshiki...
ICASSP
2008
IEEE
14 years 4 months ago
Effective error prediction using decision tree for ASR grammar network in call system
CALL (Computer Assisted Language Learning) systems using ASR (Automatic Speech Recognition) for second language learning have received increasing interest recently. However, it st...
Hongcui Wang, Tatsuya Kawahara
ICCV
2007
IEEE
14 years 4 months ago
A reliable skin mole localization scheme
Mole pattern changes are important cues in detecting melanoma at an early stage. As a first step to automatically register mole pattern changes from skin images, this paper prese...
Taeg Sang Cho, William T. Freeman, Hensin Tsao