Sciweavers

463 search results - page 40 / 93
» Using Observation and Refinement to Improve Distributed Syst...
Sort
View
CLEAR
2007
Springer
175views Biometrics» more  CLEAR 2007»
15 years 8 months ago
The IBM RT07 Evaluation Systems for Speaker Diarization on Lecture Meetings
We present the IBM systems for the Rich Transcription 2007 (RT07) speaker diarization evaluation task on lecture meeting data. We first overview our baseline system that was devel...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
125
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
CDC
2010
IEEE
143views Control Systems» more  CDC 2010»
14 years 9 months ago
Trajectory tracking control for a tele-operation setup with disturbance estimation and compensation
In this paper, we tackle the position tracking problem in a robotic tele-operation setup in the presence of perturbations. In order to cope with the disturbance we developed a new ...
Stefan Lichiardopol, Nathan van de Wouw, Dragan Ko...
122
Voted
TSMC
2008
138views more  TSMC 2008»
15 years 2 months ago
Fast Diagnosis With Sensors of Uncertain Quality
This correspondence presents an approach to the detection and isolation of component failures in large-scale systems. In the case of sensors that report at rates of 1 Hz or less, t...
Ozgur Erdinc, Craig Brideau, Peter Willett, Thiaga...
158
Voted
IWIA
2006
IEEE
15 years 8 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock