Sciweavers

2236 search results - page 408 / 448
» Intrusion detection techniques and approaches
Sort
View
MM
1999
ACM
112views Multimedia» more  MM 1999»
14 years 4 days ago
Geometrically correct imagery for teleconferencing
Current camera-monitor teleconferencing applications produce unrealistic imagery and break any sense of presence for the participants. Other capture/display technologies can be us...
Ruigang Yang, Michael S. Brown, W. Brent Seales, H...
AIIA
2009
Springer
13 years 12 months ago
Local Kernel for Brains Classification in Schizophrenia
Abstract. In this paper a novel framework for brain classification is proposed in the context of mental health research. A learning by example method is introduced by combining loc...
Umberto Castellani, E. Rossato, Vittorio Murino, M...
CIKM
2009
Springer
13 years 11 months ago
Multidimensional routing indices for efficient distributed query processing
Traditional routing indices in peer-to-peer (P2P) networks are mainly designed for document retrieval applications and maintain aggregated one-dimensional values representing the ...
Christos Doulkeridis, Akrivi Vlachou, Kjetil N&osl...
DIS
2006
Springer
13 years 11 months ago
Automatic Recognition of Landforms on Mars Using Terrain Segmentation and Classification
Mars probes send back to Earth enormous amount of data. Automating the analysis of this data and its interpretation represents a challenging test of significant benefit to the doma...
Tomasz F. Stepinski, Soumya Ghosh, Ricardo Vilalta
AIPS
2010
13 years 10 months ago
Improving Determinization in Hindsight for On-line Probabilistic Planning
Recently, `determinization in hindsight' has enjoyed surprising success in on-line probabilistic planning. This technique evaluates the actions available in the current state...
Sung Wook Yoon, Wheeler Ruml, J. Benton, Minh Do