Sciweavers

3511 search results - page 515 / 703
» Evaluation Methods for Groupware Systems
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
ICRA
2005
IEEE
127views Robotics» more  ICRA 2005»
14 years 3 months ago
Performance of Surgical Robots with Automatically Generated Spatial Virtual Fixtures
– Our recent work on robotic surgical assistant systems has led us to develop a method to generate spatial motion constraints associated with complex 3D geometry for controlling ...
Ming Li, Russell H. Taylor
AIRS
2005
Springer
14 years 3 months ago
A Query-by-Singing Technique for Retrieving Polyphonic Objects of Popular Music
This paper investigates the problem of retrieving popular music by singing. In contrast to the retrieval of MIDI music, which is easy to acquire the main melody by the selection of...
Hung-Ming Yu, Wei-Ho Tsai, Hsin-Min Wang
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
14 years 3 months ago
An artificial immune network for multimodal function optimization on dynamic environments
Multimodal optimization algorithms inspired by the immune system are generally characterized by a dynamic control of the population size and by diversity maintenance along the sea...
Fabrício Olivetti de França, Fernand...
MIR
2004
ACM
189views Multimedia» more  MIR 2004»
14 years 3 months ago
Repeating pattern discovery and structure analysis from acoustic music data
Music and songs usually have repeating patterns and prominent structure. The automatic extraction of such repeating patterns and structure is useful for further music summarizatio...
Lie Lu, Muyuan Wang, HongJiang Zhang