Sciweavers

1090 search results - page 143 / 218
» Consistency measures for feature selection
Sort
View
WOWMOM
2005
ACM
106views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
A Framework for Dynamic Service Composition
To be able to utilize the generative potential of future networks for service composition, the attributes of services and networks must be appropriately formalized, stored and mad...
Paramai Supadulchai, Finn Arve Aagesen
ICNP
2003
IEEE
14 years 3 months ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
AVSS
2007
IEEE
14 years 2 months ago
A LQR spatiotemporal fusion technique for face profile collection in smart camera surveillance
In this paper, we propose a joint face orientation estimation in smart camera networks without having to localize the cameras in advance. The system is composed of in-node coarse ...
Chung-Ching Chang, Hamid K. Aghajan
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
ISI
2007
Springer
13 years 10 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...