Sciweavers

1804 search results - page 309 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
14 years 9 months ago
Nantonac collaborative filtering: recommendation based on order responses
A recommender system suggests the items expected to be preferred by the users. Recommender systems use collaborative filtering to recommend items by summarizing the preferences of...
Toshihiro Kamishima
SIGIR
2005
ACM
14 years 2 months ago
Optimization strategies for complex queries
Previous research into the efficiency of text retrieval systems has dealt primarily with methods that consider inverted lists in sequence; these methods are known as term-at-a-tim...
Trevor Strohman, Howard R. Turtle, W. Bruce Croft
RTAS
2010
IEEE
13 years 7 months ago
Scheduling Dependent Periodic Tasks without Synchronization Mechanisms
—This article studies the scheduling of critical embedded systems, which consist of a set of communicating periodic tasks with constrained deadlines. Currently, tasks are usually...
Julien Forget, Frédéric Boniol, Emma...
TCSV
2008
155views more  TCSV 2008»
13 years 8 months ago
Heterogeneous Fusion of Omnidirectional and PTZ Cameras for Multiple Object Tracking
Dual-camera systems have been widely used in surveillance because of the ability to explore the wide field of view (FOV) of the omnidirectional camera and the wide zoom range of th...
Chung-Hao Chen, Yi Yao, David Page, Besma R. Abidi...
BMCBI
2008
118views more  BMCBI 2008»
13 years 9 months ago
PseudoGeneQuest - Service for identification of different pseudogene types in the human genome
Background: Pseudogenes, nonfunctional copies of genes, evolve fast due the lack of evolutionary pressures and thus appear in several different forms. PseudoGeneQuest is an online...
Csaba P. Ortutay, Mauno Vihinen