Sciweavers

213 search results - page 40 / 43
» Volume illustration: non-photorealistic rendering of volume ...
Sort
View
PODS
2005
ACM
124views Database» more  PODS 2005»
14 years 7 months ago
Diagnosis of asynchronous discrete event systems: datalog to the rescue!
We consider query optimization techniques for data intensive P2P applications. We show how to adapt an old technique from deductive databases, namely Query-Sub-Query (QSQ), to a s...
Serge Abiteboul, Stefan Haar, Tova Milo, Zoë ...
3DPVT
2006
IEEE
202views Visualization» more  3DPVT 2006»
14 years 1 months ago
Visual Shapes of Silhouette Sets
Shape from silhouette methods are extensively used to model dynamic and non-rigid objects using binary foreground-background images. Since the problem of reconstructing shapes fro...
Jean-Sébastien Franco, Marc Lapierre, Edmon...
ICDCSW
2005
IEEE
14 years 1 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
IPSN
2010
Springer
13 years 9 months ago
Collaborative signal processing for action recognition in body sensor networks: a distributed classification algorithm using mot
Body sensor networks are emerging as a promising platform for remote human monitoring. With the aim of extracting bio-kinematic parameters from distributed body-worn sensors, thes...
Hassan Ghasemzadeh, Vitali Loseu, Roozbeh Jafari
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham