Sciweavers

769 search results - page 121 / 154
» Identifying objects in legacy systems
Sort
View
PETRA
2010
ACM
13 years 6 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
IDA
2011
Springer
13 years 2 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
ICDE
2009
IEEE
118views Database» more  ICDE 2009»
14 years 2 months ago
An Incremental Threshold Method for Continuous Text Search Queries
Abstract—A text filtering system monitors a stream of incoming documents, to identify those that match the interest profiles of its users. The user interests are registered at ...
Kyriakos Mouratidis, HweeHwa Pang
JTRES
2009
ACM
14 years 2 months ago
On transforming Java-like programs into memory-predictable code
The ScopedMemory class of the RTSJ enables the organization of objects into regions. This ensures time-predictable management of dynamic memory. Using scopes forces the programmer...
Diego Garbervetsky, Sergio Yovine, Víctor A...
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
14 years 1 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood