Sciweavers

458 search results - page 79 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View

Publication
179views
14 years 1 months ago
AutoSelect: What You Want Is What You Get Real-Time Processing of Visual Attention and Affect
While objects of our focus of attention (“where we are looking at”) and accompanying affective responses to those objects is part of our daily experience, little research exis...
Nikolaus Bee, Helmut Prendinger, Arturo Nakasone, ...
SIGCSE
2000
ACM
155views Education» more  SIGCSE 2000»
14 years 2 months ago
A study of common pitfalls in simple multi-threaded programs
It is generally acknowledged that developing correct multithreaded codes is difficult, because threads may interact with each other in unpredictable ways. The goal of this work i...
Sung-Eun Choi, E. Christopher Lewis
IJMI
2002
82views more  IJMI 2002»
13 years 9 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...
PERVASIVE
2010
Springer
14 years 4 months ago
Virtual Compass: Relative Positioning to Sense Mobile Social Interactions
Abstract. There are endless possibilities for the next generation of mobile social applications that automatically determine your social context. A key element of such applications...
Nilanjan Banerjee, Sharad Agarwal, Paramvir Bahl, ...
ISBI
2004
IEEE
14 years 10 months ago
Enhanced Snake-Based Segmentation of Vocal Folds
We present a system to segment the medial edges of the vocal folds from stroboscopic video. The system has two components. The first learns a color transformation that optimally d...
Sonya Allin, John M. Galeotti, George D. Stetten, ...