Sciweavers

859 search results - page 152 / 172
» Behaviour Analysis of Distributed Systems Using the Tracta A...
Sort
View
CLEF
2006
Springer
13 years 11 months ago
University of Alicante at WiQA 2006
This paper presents the participation of University of Alicante at the WiQA pilot task organized as part of the CLEF 2006 campaign. For a given set of topics, this task presuppose...
Antonio Toral Ruiz, Georgiana Puscasu, Lorenza Mor...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Computer aided detection via asymmetric cascade of sparse hyperplane classifiers
This paper describes a novel classification method for computer aided detection (CAD) that identifies structures of interest from medical images. CAD problems are challenging larg...
Jinbo Bi, Senthil Periaswamy, Kazunori Okada, Tosh...
PDP
2010
IEEE
14 years 2 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
TSMC
1998
90views more  TSMC 1998»
13 years 7 months ago
Redundancy problem in writing: from human to anthropomorphic robot arm
Abstract—This paper presents the analysis of motion of a redundant anthropomorphic arm during the writing. The modeling is based on the separation of the prescribed movement into...
Veljko Potkonjak, Mirjana Popovic, Mihailo Lazarev...