Sciweavers

1804 search results - page 326 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IV
2002
IEEE
109views Visualization» more  IV 2002»
14 years 1 months ago
FaceSpace: A Facial Spatial-Domain Toolkit
We will describe a visual development system for exploring face space, both in terms of facial types and animated expressions. Imagine an n-dimensional space describing every huma...
Steve DiPaola
INFOCOM
1999
IEEE
14 years 1 months ago
Hop Reservation Multiple Access (HRMA) for Ad-Hoc Networks
A new multichannel MAC protocol called Hop-Reservation Multiple Access (HRMA) for wireless ad-hoc networks (multi-hop packet radio networks) is introduced, specified and analyzed. ...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
SPEECH
2002
66views more  SPEECH 2002»
13 years 8 months ago
Spanish recognizer of continuously spelled names over the telephone
In this paper we present a hypothesis-verification approach for a Spanish Recognizer of continuously spelled names over the telephone. We give a detailed description of the spelli...
Rubén San Segundo, José Colás...
AVSS
2005
IEEE
14 years 2 months ago
Object tracking and matting for a class of dynamic image-based representations
Image-based rendering (IBR) is an emerging technology for photo-realistic rendering of scenes from a collection of densely sampled images and videos. Recently, an object-based app...
Zhi-Feng Gan, Shing-Chow Chan, Heung-Yeung Shum
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
14 years 2 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo