Sciweavers

846 search results - page 146 / 170
» Location-Based Activity Recognition
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
SMI
2003
IEEE
223views Image Analysis» more  SMI 2003»
14 years 2 months ago
Skeleton Extraction of 3D Objects with Radial Basis Functions
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...
Wan-Chun Ma, Fu-Che Wu, Ming Ouhyoung
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
14 years 1 months ago
Selective perception policies for guiding sensing and computation in multimodal systems: a comparative analysis
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...
Nuria Oliver, Eric Horvitz
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 1 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
ADAEUROPE
2001
Springer
14 years 1 months ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde