Sciweavers

1663 search results - page 180 / 333
» Computer Security in the Real World
Sort
View
KDD
2004
ACM
182views Data Mining» more  KDD 2004»
16 years 4 months ago
Rotation invariant distance measures for trajectories
For the discovery of similar patterns in 1D time-series, it is very typical to perform a normalization of the data (for example a transformation so that the data follow a zero mea...
Michail Vlachos, Dimitrios Gunopulos, Gautam Das
ACCV
2009
Springer
15 years 10 months ago
Weighted Map for Reflectance and Shading Separation Using a Single Image
In real world, a scene is composed by many characteristics. Intrinsic images represent these characteristics by two components, reflectance (the albedo of each point) and shading (...
Sung-Hsien Hsieh, Chih-Wei Fang, Te-Hsun Wang, Chi...
SAC
2004
ACM
15 years 9 months ago
Creation and management of versions in multiversion data warehouse
A data warehouse (DW) provides an information for analytical processing, decision making, and data mining tools. On the one hand, the structure and content of a data warehouse ref...
Bartosz Bebel, Johann Eder, Christian Koncilia, Ta...
GI
2003
Springer
15 years 9 months ago
New Software Technology in Space: BOSS - a Dependable Open Source Embedded Operating System
: BOSS targets a principle which the world forgot a long time ago: Simplicity. BOSS is an embedded real time operating system for safety critical applications. Our experience shows...
Sergio Montenegro
ICCS
2007
Springer
15 years 7 months ago
Unusual Event Recognition for Mobile Alarm System
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...