Sciweavers

4050 search results - page 643 / 810
» Information Extraction from Voicemail
Sort
View
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
FPL
2009
Springer
154views Hardware» more  FPL 2009»
14 years 1 months ago
Compiler assisted runtime task scheduling on a reconfigurable computer
Multitasking reconfigurable computers with one or more reconfigurable processors are being used increasingly during the past few years. One of the major challenges in such systems...
Mojtaba Sabeghi, Vlad Mihai Sima, Koen Bertels
FGR
2000
IEEE
112views Biometrics» more  FGR 2000»
14 years 1 months ago
A Probabilistic Sensor for the Perception of Activities
This paper presents a new technique for the perception of activities using statistical description of spatio-temporal properties. With this approach, the probability of an activit...
Olivier Chomat, James L. Crowley
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
14 years 1 months ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
ER
1999
Springer
160views Database» more  ER 1999»
14 years 1 months ago
Developing an Object-Oriented Video Database System with Spatio-Temporal Reasoning Capabilities
Video data management (VDM) is fast becoming one of seminar topics in multimedia information systems. In VDM systems, there exists an important need for novel techniques and mechan...
Shermann S.-M. Chan, Qing Li