Sciweavers

3387 search results - page 677 / 678
» Model-Checking for Real-Time Systems
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
TASLP
2010
107views more  TASLP 2010»
13 years 2 months ago
A Robust Method to Extract Talker Azimuth Orientation Using a Large-Aperture Microphone Array
Knowing the orientation of a talker in the focal area of a large-aperture microphone array enables the development of better beamforming algorithms (to obtain higher-quality speech...
Avram Levi, Harvey F. Silverman
INFOCOM
2011
IEEE
12 years 11 months ago
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access
Abstract—The high density of WiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network’s limitations...
Tao Jin, Guevara Noubir, Bo Sheng
CGF
2011
12 years 11 months ago
GeoBrush: Interactive Mesh Geometry Cloning
We propose a method for interactive cloning of 3D surface geometry using a paintbrush interface, similar to the continuous cloning brush popular in image editing. Existing interac...
Kenshi Takayama, Ryan Schmidt, Karan Singh, Takeo ...
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...