Sciweavers

680 search results - page 55 / 136
» Locating Hidden Servers
Sort
View
147
Voted
TKDE
2008
162views more  TKDE 2008»
15 years 3 months ago
Continuous k-Means Monitoring over Moving Objects
Given a dataset P, a k-means query returns k points in space (called centers), such that the average squared distance between each point in P and its nearest center is minimized. S...
Zhenjie Zhang, Yin Yang, Anthony K. H. Tung, Dimit...
136
Voted
SAC
2002
ACM
15 years 3 months ago
HTTP redirection for replica catalogue lookups in data grids
1 Data distribution and replication in distributed systems require special purpose middleware tools for accessing replicated data. Data Grids, special forms of a systems distribute...
Heinz Stockinger, Andrew Hanushevsky
138
Voted
ISVC
2007
Springer
15 years 9 months ago
Gradient-Based Hand Tracking Using Silhouette Data
Optical motion capture can be classified as an inference problem: given the data produced by a set of cameras, the aim is to extract the hidden state, which in this case encodes t...
Paris Kaimakis, Joan Lasenby
141
Voted
GMP
2006
IEEE
15 years 9 months ago
Simultaneous Precise Solutions to the Visibility Problem of Sculptured Models
Abstract. We present an efficient and robust algorithm for computing continuous visibility for two- or three-dimensional shapes whose boundaries are NURBS curves or surfaces by li...
Joon-Kyung Seong, Gershon Elber, Elaine Cohen
136
Voted
ACMSE
2005
ACM
15 years 9 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke