Sciweavers

2236 search results - page 324 / 448
» Intrusion detection techniques and approaches
Sort
View
COMPGEOM
2001
ACM
14 years 28 days ago
Computing a 3-dimensional cell in an arrangement of quadrics: exactly and actually!
We present two approaches to the problem of calculating a cell in a 3-dimensional arrangement of quadrics. The first approach solves the problem using rational arithmetic. It work...
Nicola Geismann, Michael Hemmer, Elmar Schöme...
ICRA
2008
IEEE
129views Robotics» more  ICRA 2008»
14 years 3 months ago
Replanning with uncertainty in position: Sensor updates vs. prior map updates
— This paper presents two new approaches to planning with uncertainty in position that achieve better performance than existing techniques and that are able to incorporate change...
Juan Pablo Gonzalez, Anthony Stentz
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
14 years 3 months ago
Towards Visual Exploration of Topic Shifts
— This paper presents two approaches to visually analyze the topic shift of a pool of documents over a given period of time. The first of the proposed methods is based on a mult...
Kilian Thiel, Fabian Dill, Tobias Kötter, Mic...
MMDB
2004
ACM
136views Multimedia» more  MMDB 2004»
14 years 2 months ago
A motion based scene tree for browsing and retrieval of compressed videos
This paper describes a fully automatic content-based approach for browsing and retrieval of MPEG-2 compressed video. The first step of the approach is the detection of shot bound...
Haoran Yi, Deepu Rajan, Liang-Tien Chia
NSDI
2007
13 years 11 months ago
Black-box and Gray-box Strategies for Virtual Machine Migration
Virtualization can provide significant benefits in data centers by enabling virtual machine migration to eliminate hotspots. We present Sandpiper, a system that automates the ta...
Timothy Wood, Prashant J. Shenoy, Arun Venkatarama...