Sciweavers

2236 search results - page 283 / 448
» Intrusion detection techniques and approaches
Sort
View
SARA
2007
Springer
14 years 4 months ago
Reformulating Constraint Satisfaction Problems to Improve Scalability
Constraint Programming is a powerful approach for modeling and solving many combinatorial problems, scalability, however, remains an issue in . Abstraction and reformulation techni...
Kenneth M. Bayer, Martin Michalowski, Berthe Y. Ch...
ICMCS
2006
IEEE
167views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Automatic Classification of Field of View in Video
Automatic systems are needed for audiovisual databases to efficiently index, browse, summarize and retrieve, because the amount of stored data is increasing tremendously. Historic...
Maria Ferrer, Mauro Barbieri, Hans Weda
CVPR
2000
IEEE
14 years 3 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...
ROBOCUP
1999
Springer
141views Robotics» more  ROBOCUP 1999»
14 years 2 months ago
A Segmentation System for Soccer Robot Based on Neural Networks
An innovative technique for segmentation of color images is proposed. The technique implements an approach based on thresholding of the hue histogram. A new function for detecting...
Carmelo Amoroso, Antonio Chella, Vito Morreale, Pi...
SLP
1989
87views more  SLP 1989»
13 years 11 months ago
Partial Evaluation in Prolog: Some Improvements about Cut
Two main aspects of Partial Evaluation for Prolog programs are considered: treatment of cuts and control of recursion. The analysis about cut is exhaustive: we consider occurrence...
Michele Bugliesi, F. Russo