Sciweavers

2624 search results - page 355 / 525
» The 2LIP model and its implementations
Sort
View
QEST
2010
IEEE
13 years 8 months ago
Transient Analysis of Generalised Semi-Markov Processes Using Transient Stochastic State Classes
The method of stochastic state classes approaches the analysis of Generalised Semi Markov Processes (GSMP) through symbolic derivation of probability density functions over Differe...
András Horváth, Lorenzo Ridi, Enrico...
CVPR
2011
IEEE
13 years 6 months ago
Adapting an Object Detector by Considering the Worst Case: a Conservative Approach
The performance of an offline-trained classifier can be improved on-site by adapting the classifier towards newly acquired data. However, the adaptation rate is a tuning parame...
Guang Chen, TonyX. Han
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 10 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
HIPEAC
2010
Springer
14 years 7 months ago
Remote Store Programming
Abstract. This paper presents remote store programming (RSP), a programming paradigm which combines usability and efficiency through the exploitation of a simple hardware mechanism...
Henry Hoffmann, David Wentzlaff, Anant Agarwal
IVA
2009
Springer
14 years 5 months ago
GNetIc - Using Bayesian Decision Networks for Iconic Gesture Generation
Expressing spatial information with iconic gestures is abundant in human communication and requires to transform a referent representation into resembling gestural form. This task ...
Kirsten Bergmann, Stefan Kopp