Sciweavers

2874 search results - page 517 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICSE
2003
IEEE-ACM
14 years 10 months ago
Architectural Level Risk Assessment Tool Based on UML Specifications
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. The early identification of these components allows an or...
T. Wang, Ahmed E. Hassan, Ajith Guedem, Walid Abde...
CVPR
2010
IEEE
1182views Computer Vision» more  CVPR 2010»
14 years 6 months ago
Real Time Motion Capture using a Single Time-Of-Flight Camera
Markerless tracking of human pose is a hard yet relevant problem. In this paper, we derive an efficient filtering algorithm for tracking human pose at 4-10 frames per second using...
Varun Ganapathi, Christian Plagemann, Sebastian Th...
ICASSP
2009
IEEE
14 years 4 months ago
Time-sensitive behavior dynamics in multimedia fingerprinting social networks
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICDAR
2009
IEEE
14 years 4 months ago
HMM-Based Handwritten Amharic Word Recognition with Feature Concatenation
Amharic is the official language of Ethiopia and uses Ethiopic script for writing. In this paper, we present writer-independent HMM-based Amharic word recognition for offline hand...
Yaregal Assabie, Josef Bigün
ICAIL
2009
ACM
14 years 4 months ago
Query-based opinion summarization for legal blog entries
We present the first report of automatic sentiment summarization in the legal domain. This work is based on processing a set of legal questions with a system consisting of a semi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder,...