Sciweavers

765 search results - page 139 / 153
» Detecting Anomalies and Intruders
Sort
View
ICCV
2007
IEEE
14 years 1 months ago
Symmetries of non-rigid shapes
Symmetry and self-similarity is the cornerstone of Nature, exhibiting itself through the shapes of natural creations and ubiquitous laws of physics. Since many natural objects are...
Daniel Raviv, Alexander M. Bronstein, Michael M. B...
ICNS
2007
IEEE
14 years 1 months ago
Point-to-Point Services in Hybrid Networks: Technologies and Performance Metrics
Research networks, apart from pure IP packet-switched services, progressively introduce hybrid services, which combine packet switching and circuit switching technologies. Optical...
Athanassios Liakopoulos, Andreas Hanemann, Afrodit...
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 1 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
ICDM
2006
IEEE
135views Data Mining» more  ICDM 2006»
14 years 1 months ago
SAXually Explicit Images: Finding Unusual Shapes
Among the visual features of multimedia content, shape is of particular interest because humans can often recognize objects solely on the basis of shape. Over the past three decad...
Li Wei, Eamonn J. Keogh, Xiaopeng Xi
LCN
2006
IEEE
14 years 1 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz