Sciweavers

1291 search results - page 229 / 259
» Intrusion Detection for Distributed Applications
Sort
View
DAIS
2001
13 years 10 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo
HUC
2010
Springer
13 years 9 months ago
SNUPI: sensor nodes utilizing powerline infrastructure
A persistent concern of wireless sensors is the power consumption required for communication, which presents a significant adoption hurdle for practical ubiquitous computing appli...
Gabe Cohn, Erich P. Stuntebeck, Jagdish Pandey, Br...
ICML
2010
IEEE
13 years 8 months ago
FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model
We present an overview of FAB-MAP, an algorithm for place recognition and mapping developed for infrastructure-free mobile robot navigation in large environments. The system allow...
Mark Joseph Cummins, Paul M. Newman
MM
2010
ACM
174views Multimedia» more  MM 2010»
13 years 8 months ago
Personalized photograph ranking and selection system
In this paper, we propose a novel personalized ranking system for amateur photographs. Although some of the features used in our system are similar to previous work, new features,...
Che-Hua Yeh, Yuan-Chen Ho, Brian A. Barsky, Ming O...
ICPR
2010
IEEE
13 years 8 months ago
The Binormal Assumption on Precision-Recall Curves
—The precision-recall curve (PRC) has become a widespread conceptual basis for assessing classification performance. The curve relates the positive predictive value of a classi...
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno ...