Sciweavers

2236 search results - page 337 / 448
» Intrusion detection techniques and approaches
Sort
View
COMPSAC
2002
IEEE
14 years 2 months ago
XVIP: An XML-Based Video Information Processing System
We describe XVIP, an XML-based video information processing system, which extracts information from video and stores the information in a multimedia digital video library. XVIP en...
Edith C. H. Ngai, Pat Pik-Wah Chan, Edward Yau, Mi...
WISE
2002
Springer
14 years 2 months ago
Evaluating and Enhancing Meta-Search Performance in Digital Libraries
Applying meta search systems is a suitable method to support the user if there are many different retrieval services available in the Web. Due to information splitting strategies ...
Bethina Schmitt, Sven Oberländer
CP
2000
Springer
14 years 1 months ago
Extending Forward Checking
Abstract. Among backtracking based algorithms for constraint satisfaction problems (CSPs), algorithms employing constraint propagation, like forward checking (FC) and MAC, have had...
Fahiem Bacchus
DAGM
1999
Springer
14 years 1 months ago
Collaborative Multi-Robot Localization
This paper presents a statistical algorithm for collaborative mobile robot localization. Our approach uses a sample-based version of Markov localization, capable of localizing mob...
Dieter Fox, Wolfram Burgard, Hannes Kruppa, Sebast...
ICLP
1997
Springer
14 years 1 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...