Sciweavers

1712 search results - page 306 / 343
» Abstract Constraint Data Types
Sort
View
JRTIP
2008
300views more  JRTIP 2008»
14 years 11 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
SQJ
2008
74views more  SQJ 2008»
14 years 11 months ago
Quantitatively measuring object-oriented couplings
Abstract. One key to several quality factors of software is the way components are connected. Software coupling can be used to estimate a number of quality factors, including maint...
Jeff Offutt, Aynur Abdurazik, Stephen R. Schach
TSMC
2008
172views more  TSMC 2008»
14 years 11 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
87
Voted
TWC
2008
100views more  TWC 2008»
14 years 11 months ago
An Empirical Study on Time-Correlation of GSM Telephone Traffic
Abstract--In this paper, we investigate possible timecorrelation of answered call arrivals in sets of real GSM telephone traffic data. Instead of attempting to model the empirical ...
Stefano Bregni, Roberto Cioffi, Maurizio Decina
IS
1998
14 years 10 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos