Sciweavers

832 search results - page 131 / 167
» Robust Spelling Correction
Sort
View
DSOM
2008
Springer
13 years 9 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
CRITIS
2007
13 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
BILDMED
2008
13 years 9 months ago
Ein routine-integrierbares Planungswerkzeug zur operativen Rekonstruktion der Orbita
Operative reconstruction of fractured orbital floors must among others ensure equal volumes for left and right sides. In this paper, we present Thomas M. Deserno1 Wei Liao1 a plan...
Melanie Kleiner, Dirk Schulze, Pit Jakob Voss, Tho...
LREC
2010
130views Education» more  LREC 2010»
13 years 9 months ago
Modified LTSE-VAD Algorithm for Applications Requiring Reduced Silence Frame Misclassification
The LTSE-VAD is one of the best known algorithms for voice activity detection. In this paper we present a modified version of this algorithm, that makes the VAD decision not takin...
Iker Luengo, Eva Navas, Igor Odriozola, Ibon Sarat...
DICTA
2003
13 years 9 months ago
Real-time Surveillance System by Use of the Face Understanding Technologies
This paper introduced a human surveillance system which integrated the face understanding technologies to recognize personal identities in real time. We proposed a coarse-to-fine s...
Yi-Tsung Chien, Yea-Shuan Huang, Sheng-Wen Jeng, Y...