Sciweavers

1407 search results - page 190 / 282
» Systems Theory Model for Information Security
Sort
View
ICPR
2002
IEEE
14 years 2 months ago
Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents
Abstract Target detection and tracking is one of the most important and fundamental technologies to develop real world computer vision systems such as security and traffic monitori...
Norimichi Ukita, Takashi Matsuyama
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 9 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
JDCTA
2010
143views more  JDCTA 2010»
13 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
FAC
2000
114views more  FAC 2000»
13 years 9 months ago
Representational Reasoning and Verification
Formal approaches to the design of interactive systems rely on reasoning about properties of the t a very high level of abstraction. Specifications to support such an approach typi...
Gavin J. Doherty, José Creissac Campos, Mic...
SPEECH
2010
154views more  SPEECH 2010»
13 years 4 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...