Sciweavers

1291 search results - page 254 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
13 years 10 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
ATAL
2008
Springer
13 years 9 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
CIKM
2008
Springer
13 years 9 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
NIPS
1997
13 years 8 months ago
Extended ICA Removes Artifacts from Electroencephalographic Recordings
Severe contamination of electroencephalographic (EEG) activity by eye movements, blinks, muscle, heart and line noise is a serious problem for EEG interpretation and analysis. Rej...
Tzyy-Ping Jung, Colin Humphries, Te-Won Lee, Scott...
MM
2010
ACM
198views Multimedia» more  MM 2010»
13 years 7 months ago
Social pixels: genesis and evaluation
Huge amounts of social multimedia is being created daily by a combination of globally distributed disparate sensors, including human-sensors (e.g. tweets) and video cameras. Taken...
Vivek K. Singh, Mingyan Gao, Ramesh Jain