Sciweavers

811 search results - page 120 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CW
2003
IEEE
14 years 2 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ICCV
2005
IEEE
14 years 2 months ago
HMM Based Falling Person Detection Using Both Audio and Video
Automatic detection of a falling person in video is an important problem with applications in security and safety areas including supportive home environments and CCTV surveillance...
B. Ugur Töreyin, Yigithan Dedeoglu, A. Enis &...
GRAPHITE
2005
ACM
14 years 2 months ago
A VR platform for field-scale phenomena: an application to fire spread experiments
Digital computers are powerful tools for studying natural phenomena at large-scales. Nevertheless, custom-made methods have to be developed to digitalize, simulate and finally vis...
Alexandre Muzy, Nicolas Fauvet, Patrick Bourdot, F...
ICAC
2007
IEEE
14 years 3 months ago
SLA Decomposition: Translating Service Level Objectives to System Level Thresholds
In today’s complex and highly dynamic computing environments, systems/services have to be constantly adjusted to meet Service Level Agreements (SLAs) and to improve resource uti...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
IUI
1998
ACM
14 years 29 days ago
Coherent Gestures, Locomotion, and Speech in Life-like Pedagogical Agents
Life-likeanimatedinterfaceagentsforknowledge-basedlearning environments can provide timely, customized advice to support students’ problem solving. Because of their strong visua...
Stuart G. Towns, Jennifer L. Voerman, Charles B. C...