Sciweavers

321 search results - page 64 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
GD
2008
Springer
13 years 5 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
JCDL
2006
ACM
176views Education» more  JCDL 2006»
13 years 10 months ago
A hierarchical, HMM-based automatic evaluation of OCR accuracy for a digital library of books
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo an...
Shaolei Feng, R. Manmatha
JSS
2010
120views more  JSS 2010»
13 years 3 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
IPPS
2008
IEEE
13 years 11 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
CVPR
2011
IEEE
12 years 11 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid