Sciweavers

1291 search results - page 227 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICDM
2003
IEEE
220views Data Mining» more  ICDM 2003»
14 years 1 months ago
Exploiting Unlabeled Data for Improving Accuracy of Predictive Data Mining
Predictive data mining typically relies on labeled data without exploiting a much larger amount of available unlabeled data. The goal of this paper is to show that using unlabeled...
Kang Peng, Slobodan Vucetic, Bo Han, Hongbo Xie, Z...
HIPC
2003
Springer
14 years 1 months ago
Thread Migration/Checkpointing for Type-Unsafe C Programs
Thread migration/checkpointing is becoming indispensable for load balancing and fault tolerance in high performance computing applications, and its success depends on the migration...
Hai Jiang, Vipin Chaudhary
IS4TH
2003
Springer
14 years 1 months ago
Realistic Haptic Interaction in Volume Sculpting for Surgery Simulation
Realistic haptic interaction in volume sculpting is a decisive prerequisite for successful simulation of bone surgery. We present a haptic rendering algorithm, based on a multi-poi...
Andreas Petersik, Bernhard Pflesser, Ulf Tiede, Ka...
EUROCAST
2007
Springer
190views Hardware» more  EUROCAST 2007»
14 years 16 days ago
Efficient On-Board Stereo Vision Pose Estimation
Abstract. This paper presents an efficient technique for real time estimation of on-board stereo vision system pose. The whole process is performed in the Euclidean space and consi...
Angel Domingo Sappa, Fadi Dornaika, David Ger&oacu...
ACCV
2006
Springer
14 years 12 days ago
Complex Activity Representation and Recognition by Extended Stochastic Grammar
Stochastic grammar has been used in many video analysis and event recognition applications as an efficient model to represent large-scale video activity. However, in previous works...
Zhang Zhang, Kaiqi Huang, Tieniu Tan