Sciweavers

2788 search results - page 540 / 558
» Use of Data Recharging for Personal Information Environment
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
CSE
2009
IEEE
13 years 10 months ago
Energy Consumption of Residential and Professional Switches
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...
ISMB
2000
13 years 8 months ago
Intelligent Aids for Parallel Experiment Planning and Macromolecular Crystallization
This paper presents a framework called Parallel Experiment Planning (PEP) that is based on an abstraction of how experiments are performed in the domain of macromolecular crystall...
Vanathi Gopalakrishnan, Bruce G. Buchanan, John M....
ICMI
2010
Springer
213views Biometrics» more  ICMI 2010»
13 years 5 months ago
Toward natural interaction in the real world: real-time gesture recognition
Using a new hand tracking technology capable of tracking 3D hand postures in real-time, we developed a recognition system for continuous natural gestures. By natural gestures, we ...
Ying Yin, Randall Davis
IJRR
2011
210views more  IJRR 2011»
13 years 2 months ago
Visual-Inertial Sensor Fusion: Localization, Mapping and Sensor-to-Sensor Self-calibration
Visual and inertial sensors, in combination, are able to provide accurate motion estimates and are well-suited for use in many robot navigation tasks. However, correct data fusion...
Jonathan Kelly, Gaurav S. Sukhatme