Sciweavers

1270 search results - page 121 / 254
» IF Validation Environment Tutorial
Sort
View
PSIVT
2007
Springer
354views Multimedia» more  PSIVT 2007»
14 years 4 months ago
Real-Time Hand Gesture Detection and Recognition Using Boosted Classifiers and Active Learning
In this article a robust and real-time hand gesture detection and recognition system for dynamic environments is proposed. The system is based on the use of boosted classifiers for...
Hardy Francke, Javier Ruiz-del-Solar, Rodrigo Vers...
RAID
2007
Springer
14 years 4 months ago
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
Matthias Vallentin, Robin Sommer, Jason Lee, Craig...
CLUSTER
2006
IEEE
14 years 4 months ago
A Parallel Algorithm for the Solution of the Deconvolution Problem on Heterogeneous Networks
In this work we present a parallel algorithm for the solution of a least squares problem with structured matrices. This problem arises in many applications mainly related to digit...
Pedro Alonso, Antonio M. Vidal, Alexey L. Lastovet...
DSN
2006
IEEE
14 years 4 months ago
Randomized Intrusion-Tolerant Asynchronous Services
Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and time complexities, they ha...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
GLOBECOM
2006
IEEE
14 years 4 months ago
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing
— We consider a set of computer resources used by a service provider to host enterprise applications subject to service level agreements. We present an approach for resource opti...
Kaiqi Xiong, Harry G. Perros