Sciweavers

1191 search results - page 169 / 239
» Distributed Detection of Information Flows
Sort
View
CVPR
2010
IEEE
14 years 3 months ago
Spatialized Epitome and Its Applications
Due to the lack of explicit spatial consideration, existing epitome model may fail for image recognition and target detection, which directly motivates us to propose the so-calle...
Xinqi Chu, Shuicheng Yan, Liyuan Li, Kap Luk Chan,...
CVPR
2004
IEEE
14 years 9 months ago
An Algorithm for Multiple Object Trajectory Tracking
Most tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework called Hidden Markov Model, where the distribution of the object state a...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
IJWIS
2007
181views more  IJWIS 2007»
13 years 7 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
ICFP
2001
ACM
14 years 7 months ago
Functioning without Closure: Type-Safe Customized Function Representations for Standard ML
The CIL compiler for core Standard ML compiles whole ML programs using a novel typed intermediate language that supports the generation of type-safe customized data representation...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...