Sciweavers

1030 search results - page 32 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
ACSAC
2004
IEEE
14 years 15 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ICAT
2007
IEEE
14 years 3 months ago
Exploiting Virtual Objects' Attributes and Avatar's Behavior in DVEs Partitioning
Partitioning constitutes one of the most critical challenges a distributed virtual environment needs to handle and is related to the efficient assignment of the existing entities ...
Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiats...
ICDCSW
2006
IEEE
14 years 2 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
PERVASIVE
2010
Springer
14 years 3 months ago
On the Use of Brain Decoded Signals for Online User Adaptive Gesture Recognition Systems
Activity and context recognition in pervasive and wearable computing ought to continuously adapt to changes typical of open-ended scenarios, such as changing users, sensor characte...
Kilian Förster, Andrea Biasiucci, Ricardo Cha...
SIGDIAL
2010
13 years 6 months ago
Cooperative User Models in Statistical Dialog Simulators
Statistical user simulation is a promising methodology to train and evaluate the performance of (spoken) dialog systems. We work with a modular architecture for data-driven simula...
Meritxell González, Silvia Quarteroni, Gius...