Sciweavers

2874 search results - page 520 / 575
» Intrusion Detection: Systems and Models
Sort
View
DEXA
2003
Springer
147views Database» more  DEXA 2003»
14 years 3 months ago
Context-Aware Data Mining Framework for Wireless Medical Application
Abstract. Data mining, which aims at extracting interesting information from large collections of data, has been widely used as an effective decision making tool. Mining the datas...
Pravin Vajirkar, Sachin Singh, Yugyung Lee
ICRA
2002
IEEE
91views Robotics» more  ICRA 2002»
14 years 2 months ago
Tactile Tracking of Arteries in Robotic Surgery
Locating arteries hidden beneath superficial tissue can be a difficult task in minimally invasive surgery. This paper reports the development of a system that finds the paths of a...
Ryan A. Beasley, Robert D. Howe
ICLP
2001
Springer
14 years 2 months ago
On a Tabling Engine That Can Exploit Or-Parallelism
Tabling is an implementation technique that improves the declarativeness and expressiveness of Prolog by reusing solutions to goals. Quite a few interesting applications of tabling...
Ricardo Rocha, Fernando M. A. Silva, Vítor ...
MM
1999
ACM
112views Multimedia» more  MM 1999»
14 years 2 months ago
Geometrically correct imagery for teleconferencing
Current camera-monitor teleconferencing applications produce unrealistic imagery and break any sense of presence for the participants. Other capture/display technologies can be us...
Ruigang Yang, Michael S. Brown, W. Brent Seales, H...
CEAS
2008
Springer
13 years 12 months ago
Personalized Spam Filtering for Gray Mail
Gray mail, messages that could reasonably be considered either spam or good by different email users, is a commonly observed issue in production spam filtering systems. In this pa...
Ming-Wei Chang, Scott Yih, Robert McCann