Sciweavers

1663 search results - page 156 / 333
» Computer Security in the Real World
Sort
View
DSN
2008
IEEE
15 years 10 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
ICPR
2008
IEEE
15 years 10 months ago
MCS-based balancing techniques for skewed classes: An empirical comparison
The class imbalance is a critical problem in classification tasks related to many real world applications. A large number of solutions were proposed in literature, both at the al...
Maria Teresa Ricamato, Claudio Marrocco, Francesco...
106
Voted
ICPR
2008
IEEE
15 years 10 months ago
Estimating the number of people in a video sequence via geometrical model
We propose a novel technique for estimating the number of people in a video sequence; it has the advantages of being stable even in crowded situations and needing no ground-truth ...
Hiroyuki Arai, Isao Miyagawa, Hideki Koike, Miki H...
AINA
2007
IEEE
15 years 10 months ago
Deployment of Services-Oriented Applications Integrating Physical and IT Systems
A broad range of industries must be able to seamlessly integrate control applications using sensors distributed in the real world and IT applications supporting various business a...
Antonin Chazalet, Philippe Lalanda
IPPS
2007
IEEE
15 years 10 months ago
Distributed Adaptive Particle Swarm Optimizer in Dynamic Environment
Particle Swarm Optimization (PSO) is a population-based stochastic optimization technique, which can be used to find an optimal, or near optimal, solution to a numerical and quali...
Xiaohui Cui, Thomas E. Potok