Sciweavers

3707 search results - page 644 / 742
» Clustering by Pattern Similarity
Sort
View
ICAPR
2005
Springer
14 years 3 months ago
3D Action Modeling and Reconstruction for 2D Human Body Tracking
In this paper we present a technique for predicting the 2D human body joints and limbs position in monocular image sequences, and reconstructing its corresponding 3D postures using...
Ignasi Rius, Daniel Rowe, Jordi Gonzàlez, F...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
SELMAS
2005
Springer
14 years 3 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
VLDB
2005
ACM
139views Database» more  VLDB 2005»
14 years 3 months ago
Analyzing Plan Diagrams of Database Query Optimizers
A “plan diagram” is a pictorial enumeration of the execution plan choices of a database query optimizer over the relational selectivity space. In this paper, we present and an...
Naveen Reddy, Jayant R. Haritsa
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman