Sciweavers

2269 search results - page 424 / 454
» Behavioral Intrusion Detection
Sort
View
CGO
2008
IEEE
14 years 4 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
ICMI
2007
Springer
100views Biometrics» more  ICMI 2007»
14 years 4 months ago
Presentation sensei: a presentation training system using speech and image processing
In this paper we present a presentation training system that observes a presentation rehearsal and provides the speaker with recommendations for improving the delivery of the pres...
Kazutaka Kurihara, Masataka Goto, Jun Ogata, Yosuk...
ICMI
2004
Springer
129views Biometrics» more  ICMI 2004»
14 years 3 months ago
Multimodal transformed social interaction
Understanding human-human interaction is fundamental to the long-term pursuit of powerful and natural multimodal interfaces. Nonverbal communication, including body posture, gestu...
Matthew Turk, Jeremy N. Bailenson, Andrew C. Beall...
AVSS
2003
IEEE
14 years 3 months ago
Improving the Extraction of Temporal Motion Strength Signals from Video Recordings of Neonatal Seizures
Automated processing and analysis of video recordings of neonatal seizures can generate novel methods for extracting quantitative information that is relevant only to the seizure [...
Nicolaos B. Karayiannis, Guozhi Tao
ICCAD
2000
IEEE
119views Hardware» more  ICCAD 2000»
14 years 2 months ago
Synthesis of Operation-Centric Hardware Descriptions
Most hardware description frameworks, whether schematic or textual, use cooperating finite state machines (CFSM) as the underlying abstraction. In the CFSM framework, a designer ...
James C. Hoe, Arvind