Sciweavers

1343 search results - page 222 / 269
» Learning to Complete Sentences
Sort
View
ICEIS
2008
IEEE
14 years 4 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
SASO
2008
IEEE
14 years 4 months ago
Bottom-Up Self-Organization of Unpredictable Demand and Supply under Decentralized Power Management
In the DEZENT1 project we had established a distributed base model for negotiating electric power from widely distributed (renewable) power sources on multiple levels in successio...
Horst F. Wedde, Sebastian Lehnhoff, Christian Reht...
TRIDENTCOM
2008
IEEE
14 years 4 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
BLISS
2007
IEEE
14 years 4 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
ICRA
2007
IEEE
126views Robotics» more  ICRA 2007»
14 years 4 months ago
Flying Fast and Low Among Obstacles
— Safe autonomous flight is essential for widespread acceptance of aircraft that must fly close to the ground. We have developed a method of collision avoidance that can be use...
Sebastian Scherer, Sanjiv Singh, Lyle Chamberlain,...