Sciweavers

2236 search results - page 444 / 448
» Intrusion detection techniques and approaches
Sort
View
DKE
2008
158views more  DKE 2008»
13 years 7 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
JCST
2008
121views more  JCST 2008»
13 years 7 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
JMM2
2006
167views more  JMM2 2006»
13 years 7 months ago
Computer Vision Methods for Improved Mobile Robot State Estimation in Challenging Terrains
External perception based on vision plays a critical role in developing improved and robust localization algorithms, as well as gaining important information about the vehicle and ...
Annalisa Milella, Giulio Reina, Roland Siegwart
ENGL
2007
130views more  ENGL 2007»
13 years 7 months ago
Wavelet Based Classification for Cancer Diagnosis
— We make use of discrete wavelets to extract distinguishing features between normal and cancerous human breast tissue fluorescence spectra. These are then used in conjunction wi...
Bhadra Mani, C. Raghavendra Rao, P. Anantha Lakshm...
PAMI
2008
146views more  PAMI 2008»
13 years 7 months ago
Video Event Recognition Using Kernel Methods with Multilevel Temporal Alignment
In this work, we systematically study the problem of event recognition in unconstrained news video sequences. We adopt the discriminative kernel-based method for which video clip s...
Dong Xu, Shih-Fu Chang