Sciweavers

8278 search results - page 1476 / 1656
» Context-Aware Process Networks
Sort
View
GLOBECOM
2009
IEEE
15 years 6 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
GLVLSI
2009
IEEE
172views VLSI» more  GLVLSI 2009»
15 years 6 months ago
Contact merging algorithm for efficient substrate noise analysis in large scale circuits
A methodology is proposed to efficiently estimate the substrate noise generated by large scale aggressor circuits. Small spatial voltage differences within the ground distribution...
Emre Salman, Renatas Jakushokas, Eby G. Friedman, ...
129
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 6 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ADS
2004
Springer
15 years 6 months ago
Neural Architecture for Temporal Emotion Classification
Abstract. In this pilot study, a neural architecture for temporal emotion recognition from image sequences is proposed. The investigation aims at the development of key principles ...
Roland Schweiger, Pierre Bayerl, Heiko Neumann
134
Voted
ATAL
2006
Springer
15 years 6 months ago
Multi-agent based peer-to-peer information retrieval systems with concurrent search sessions
In cooperative peer-to-peer information retrieval systems, each node can be considered an intelligent agent and these agents work collectively to provide an information retrieval ...
Haizheng Zhang, Victor R. Lesser
« Prev « First page 1476 / 1656 Last » Next »