Sciweavers

1697 search results - page 309 / 340
» Spike Feature Extraction Using Informative Samples
Sort
View
TCSV
2008
94views more  TCSV 2008»
13 years 7 months ago
Human Activity Recognition Based on Silhouette Directionality
Recent advances in computer vision and pattern recognition have fuelled numerous initiatives that aim to intelligently recognize human activities. In this paper, we propose an algo...
Meghna Singh, Anup Basu, Mrinal K. Mandal
TIFS
2008
142views more  TIFS 2008»
13 years 7 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
UM
2010
Springer
13 years 6 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
ACSAC
2004
IEEE
13 years 11 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
BC
1999
94views more  BC 1999»
13 years 7 months ago
Speed tuning in elementary motion detectors of the correlation type
A prominent model of visual motion detection is the so-called correlation or Reichardt detector. Whereas this model can account for many properties of motion vision, from humans to...
Johannes M. Zanker, M. V. Srinivasan, Martin Egelh...