Sciweavers

112 search results - page 20 / 23
» Segmenting Motion Capture Data into Distinct Behaviors
Sort
View
ICDE
2002
IEEE
146views Database» more  ICDE 2002»
14 years 9 months ago
Data Mining Meets Performance Evaluation: Fast Algorithms for Modeling Bursty Traffic
Network, web, and disk I/O traffic are usually bursty, self-similar [9, 3, 5, 6] and therefore can not be modeled adequately with Poisson arrivals[9]. However, we do want to model...
Mengzhi Wang, Ngai Hang Chan, Spiros Papadimitriou...
SASN
2003
ACM
14 years 26 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
JAISE
2010
192views Algorithms» more  JAISE 2010»
13 years 2 months ago
Activity recognition using temporal evidence theory
The ability to identify the behavior of people in a home is at the core of Smart Home functionality. Such environments are equipped with sensors that unobtrusively capture informat...
Susan McKeever, Juan Ye, Lorcan Coyle, Chris Bleak...

Book
34534views
15 years 6 months ago
OpenCV - Open Source Computer Vision Reference Manual
OpenCV is a C/C++ computer vision library originally developed by Intel. It is free for commercial and research use under a BSD license. The library is cross-platform. It is highl...
Intel
ICAPR
2005
Springer
14 years 1 months ago
Hierarchical Clustering of Dynamical Systems Based on Eigenvalue Constraints
Abstract. This paper addresses the clustering problem of hidden dynamical systems behind observed multivariate sequences by assuming an interval-based temporal structure in the seq...
Hiroaki Kawashima, Takashi Matsuyama