Sciweavers

1075 search results - page 123 / 215
» Multiple Spin-Block Decisions
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ISM
2008
IEEE
140views Multimedia» more  ISM 2008»
14 years 2 months ago
Medical Video Event Classification Using Shared Features
Advances in video technology are being incorporated into today’s medical research and education. Medical videos contain important medical events, such as diagnostic or therapeut...
Yu Cao, Shih-Hsi Liu, Ming Li, Sung Baang, Sanqing...
SEUS
2008
IEEE
14 years 2 months ago
Context-Aware Middleware for Reliable Multi-hop Multi-path Connectivity
The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
TOOLS
2008
IEEE
14 years 2 months ago
An AsmL Semantics for Dynamic Structures and Run Time Schedulability in UML-RT
Abstract. Many real-time systems use runtime structural reconfiguration mechanisms based on dynamic creation and destruction of components. To support such features, UML-RT provid...
Stefan Leue, Alin Stefanescu, Wei Wei
WACV
2008
IEEE
14 years 2 months ago
Mosaicfaces: a discrete representation for face recognition
Most face recognition algorithms use a “distancebased” approach: gallery and probe images are projected into a low dimensional feature space and decisions about matching are b...
Jania Aghajanian, Simon J. D. Prince