Sciweavers

3424 search results - page 302 / 685
» Building Diverse Computer Systems
Sort
View
153
Voted
CVPR
2009
IEEE
15 years 6 months ago
Switching Gaussian Process Dynamic Models for simultaneous composite motion tracking and recognition
Traditional dynamical systems used for motion tracking cannot effectively handle high dimensionality of the motion states and composite dynamics. In this paper, to address both is...
Jixu Chen, Minyoung Kim, Yu Wang, Qiang Ji
147
Voted
TASE
2011
IEEE
14 years 9 months ago
Multiclass Flow Line Models of Semiconductor Manufacturing Equipment for Fab-Level Simulation
—For multiclass flow line models, we identify a class of service times that allow a decomposition of the system into subsets of servers called channels. In each channel, the cus...
James R. Morrison
ICPR
2002
IEEE
15 years 7 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
107
Voted
HOTI
2008
IEEE
15 years 9 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
WWW
2005
ACM
16 years 3 months ago
Improving recommendation lists through topic diversification
In this work we present topic diversification, a novel method designed to balance and diversify personalized recommendation lists in order to reflect the user's complete spec...
Cai-Nicolas Ziegler, Sean M. McNee, Joseph A. Kons...