Sciweavers

1849 search results - page 315 / 370
» A Novel Approach Towards Automatic Data Distribution
Sort
View
ACSAC
2008
IEEE
15 years 7 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
109
Voted
ICCV
2005
IEEE
16 years 2 months ago
Modeling Scenes with Local Descriptors and Latent Aspects
We present a new approach to model visual scenes in image collections, based on local invariant features and probabilistic latent space models. Our formulation provides answers to...
Pedro Quelhas, Florent Monay, Jean-Marc Odobez, Da...
131
Voted
EWSN
2010
Springer
15 years 9 months ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...
PRL
2007
138views more  PRL 2007»
15 years 1 days ago
Ent-Boost: Boosting using entropy measures for robust object detection
Recently, boosting has come to be used widely in object-detection applications because of its impressive performance in both speed and accuracy. However, learning weak classifier...
Duy-Dinh Le, Shin'ichi Satoh
SIGMOD
1998
ACM
142views Database» more  SIGMOD 1998»
15 years 4 months ago
Dimensionality Reduction for Similarity Searching in Dynamic Databases
Databases are increasingly being used to store multi-media objects such as maps, images, audio and video. Storage and retrieval of these objects is accomplished using multi-dimens...
Kothuri Venkata Ravi Kanth, Divyakant Agrawal, Amb...