Sciweavers

308 search results - page 35 / 62
» Proactive identification of performance problems
Sort
View
CMS
2006
13 years 10 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
ICPR
2008
IEEE
14 years 10 months ago
A probabilistic Self-Organizing Map for facial recognition
This article presents a method aiming at quantifying the visual similarity between an image and a class model. This kind of problem is recurrent in many applications such as objec...
Christophe Garcia, Grégoire Lefebvre
ICPR
2006
IEEE
14 years 10 months ago
Multilinear Principal Component Analysis of Tensor Objects for Recognition
In this paper, a multilinear formulation of the popular Principal Component Analysis (PCA) is proposed, named as multilinear PCA (MPCA), where the input can be not only vectors, b...
Anastasios N. Venetsanopoulos, Haiping Lu, Konstan...
EUPROJECTS
2005
Springer
14 years 2 months ago
Participatory Insight to Universal Access: Methods and Validation Exercises
Participatory methods can, in principle, be applied for a variety of purposes to gain insight into the context of use of an artefact or the way in which tasks are performed by end ...
Michael Pieper, Karl Stroetmann
ISSS
1997
IEEE
142views Hardware» more  ISSS 1997»
14 years 1 months ago
Optimization Method for Broadband Modem FIR Filter Design using Common Subexpression Elimination
- An approach for broadband modem FIR filter design optimization is presented. It addresses the minimization of the number of addersubtractors used in the hardware implementation o...
Robert Pasko, Patrick Schaumont, Veerle Derudder, ...