Sciweavers

1411 search results - page 245 / 283
» Performance analysis of BitTorrent-like systems with heterog...
Sort
View
CN
2000
95views more  CN 2000»
13 years 8 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
NDQA
2003
156views Education» more  NDQA 2003»
13 years 10 months ago
Toward a Question Answering Roadmap
Growth in government investment, academic research, and commercial question answering (QA) systems is motivating a need for increased planning and coordination. The internationali...
Mark T. Maybury
ECCV
2004
Springer
14 years 2 months ago
AQUATICS Reconstruction Software: The Design of a Diagnostic Tool Based on Computer Vision Algorithms
Computer vision methods can be applied to a variety of medical and surgical applications, and many techniques and algorithms are available that can be used to recover 3D shapes and...
Andrea Giachetti, Gianluigi Zanetti
NPAR
2000
ACM
14 years 1 months ago
Performance-driven hand-drawn animation
We present a novel method for generating performance-driven, “hand-drawn” animation in real-time. Given an annotated set of hand-drawn faces for various expressions, our algor...
Ian Buck, Adam Finkelstein, Charles E. Jacobs, All...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 10 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...