Sciweavers

1291 search results - page 117 / 259
» Intrusion Detection for Distributed Applications
Sort
View
MM
2005
ACM
152views Multimedia» more  MM 2005»
14 years 2 months ago
Critical video quality for distributed automated video surveillance
Large-scale distributed video surveillance systems pose new scalability challenges. Due to the large number of video sources in such systems, the amount of bandwidth required to t...
Pavel Korshunov, Wei Tsang Ooi
FGCS
2007
146views more  FGCS 2007»
13 years 9 months ago
Distributed medical images analysis on a Grid infrastructure
In this paper medical applications on a Grid infrastructure, the MAGIC-5 Project, are presented and discussed. MAGIC-5 aims at developing Computer Aided Detection (CADe) software ...
Roberto Bellotti, Piergiorgio Cerello, S. Tangaro,...
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
11 years 11 months ago
Simplex Distributions for Embedding Data Matrices over Time
Early stress recognition is of great relevance in precision plant protection. Pre-symptomatic water stress detection is of particular interest, ultimately helping to meet the chal...
Kristian Kersting, Mirwaes Wahabzada, Christoph R&...
CEAS
2004
Springer
14 years 2 months ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
ESCIENCE
2005
IEEE
14 years 2 months ago
Transparent Resource Allocation to Exploit Idle Cluster Nodes in Computational Grids
Clusters of workstations are one of the most suitable resources to assist e-scientists in the execution of largescale experiments that demand processing power. The utilization rat...
Marco Aurélio Stelmar Netto, Rodrigo N. Cal...