Sciweavers

458 search results - page 77 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
TCSV
2008
153views more  TCSV 2008»
13 years 9 months ago
Broadcast Court-Net Sports Video Analysis Using Fast 3-D Camera Modeling
This paper addresses the automatic analysis of court-net sports video content. We extract information about the players, the playing-field in a bottom-up way until we reach scene-l...
Jungong Han, Dirk Farin, Peter H. N. de With
MEMOCODE
2003
IEEE
14 years 3 months ago
LOTOS Code Generation for Model Checking of STBus Based SoC: the STBus interconnect
In the design process of SoC (System on Chip), validation is one of the most critical and costly activity. The main problem for industrial companies like STMicroelectronics, stand...
Pierre Wodey, Geoffrey Camarroque, Fabrice Baray, ...
TITB
2008
97views more  TITB 2008»
13 years 9 months ago
A Novel Breast Tissue Density Classification Methodology
Abstract--It has been shown that the accuracy of mammographic abnormality detection methods is strongly dependent on the breast tissue characteristics, where a dense breast drastic...
Arnau Oliver, Jordi Freixenet, Robert Marti, Josep...
ICDE
2006
IEEE
193views Database» more  ICDE 2006»
14 years 11 months ago
Probabilistic Message Passing in Peer Data Management Systems
Until recently, most data integration techniques involved central components, e.g., global schemas, to enable transparent access to heterogeneous databases. Today, however, with t...
Philippe Cudré-Mauroux, Karl Aberer, Andras...
CCS
2005
ACM
14 years 3 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...