Sciweavers

7984 search results - page 1302 / 1597
» Exploring personal information
Sort
View
ICMCS
2007
IEEE
95views Multimedia» more  ICMCS 2007»
15 years 10 months ago
The Role of Visual Content and Style for Concert Video Indexing
This paper contributes to the automatic indexing of concert video. In contrast to traditional methods, which rely primarily on audio information for summarization applications, we...
Cees G. M. Snoek, Marcel Worring, Arnold W. M. Sme...
ICNS
2007
IEEE
15 years 10 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
15 years 10 months ago
Greedy but Safe Replanning under Kinodynamic Constraints
— We consider motion planning problems for a vehicle with kinodynamic constraints, where there is partial knowledge about the environment and replanning is required. We present a...
Kostas E. Bekris, Lydia E. Kavraki
INFOCOM
2007
IEEE
15 years 10 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
IPPS
2007
IEEE
15 years 10 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
« Prev « First page 1302 / 1597 Last » Next »