Sciweavers

2874 search results - page 515 / 575
» Intrusion Detection: Systems and Models
Sort
View
QEST
2005
IEEE
14 years 3 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
SIAMCO
2000
89views more  SIAMCO 2000»
13 years 9 months ago
Stability Radius and Internal Versus External Stability in Banach Spaces: An Evolution Semigroup Approach
In this paper the theory of evolution semigroups is developed and used to provide a framework to study the stability of general linear control systems. These include autonomous and...
Stephen Clark, Yuri Latushkin, Stephen Montgomery-...
CVPR
2007
IEEE
14 years 12 months ago
Eigenboosting: Combining Discriminative and Generative Information
A major shortcoming of discriminative recognition and detection methods is their noise sensitivity, both during training and recognition. This may lead to very sensitive and britt...
Helmut Grabner, Peter M. Roth, Horst Bischof
CVPR
2007
IEEE
14 years 12 months ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
ECCV
2002
Springer
14 years 11 months ago
Fusion of Multiple Tracking Algorithms for Robust People Tracking
This paper shows how the output of a number of detection and tracking algorithms can be fused to achieve robust tracking of people in an indoor environment. The new tracking system...
Nils T. Siebel, Stephen J. Maybank