Sciweavers

2835 search results - page 436 / 567
» Common Semantics for Use Cases and Task Models
Sort
View
ICVGIP
2004
13 years 10 months ago
Handling Occlusions in Monocular Surveillance Systems
Recent advances in computing machines and the availability of inexpensive vision sensors have paved the way for development of real-time imaging systems. Smart systems with a sing...
Prithwijit Guha, Nisarg Vyas, Amitabha Mukerjee, K...
PR
2008
145views more  PR 2008»
13 years 9 months ago
Gesture spotting with body-worn inertial sensors to detect user activities
We present a method for spotting sporadically occurring gestures in a continuous data stream from body-worn inertial sensors. Our method is based on a natural partitioning of cont...
Holger Junker, Oliver Amft, Paul Lukowicz, Gerhard...
JCP
2007
98views more  JCP 2007»
13 years 9 months ago
Computation of Immittance and Line Spectral Frequencies Based on Inter-frame Ordering Property
— Line spectral frequencies (LSF) and immittance spectral frequencies (ISF) are widely used in modern speech codecs based on autoregressive model. This paper addresses LSF and IS...
Vasyl Semenov
JDWM
2007
90views more  JDWM 2007»
13 years 9 months ago
Mining for Mutually Exclusive Items in Transaction Databases
Association rule mining is a popular task that involves the discovery of co-occurences of items in transaction databases. Several extensions of the traditional association rule mi...
George Tzanis, Christos Berberidis
EUROSEC
2010
ACM
14 years 2 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani