Sciweavers

2237 search results - page 110 / 448
» Advanced Prosody Modelling
Sort
View
IAT
2007
IEEE
15 years 11 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
159
Voted
ICRA
2005
IEEE
178views Robotics» more  ICRA 2005»
15 years 10 months ago
Supervised Multispectral Image Segmentation using Active Contours
— Active contours have been widely used as image segmentation methods. The use of level set theory has provided more flexibility and convenience for the implementation of active...
Cheolha Pedro Lee, Wesley E. Snyder, Cliff Wang
167
Voted
IPPS
2003
IEEE
15 years 10 months ago
Architectural Frameworks for MPP Systems on a Chip
Advances in fabrication techniques are now enabling new hybrid CPU/FPGA computing resources to be integrated onto a single chip. While these new hybrids promise significant perfor...
David L. Andrews, Douglas Niehaus
194
Voted
IADIS
2004
15 years 6 months ago
Implementing Cognitive Modellig in CS Education: Aligning Theory and Practice of Learning to Program
It can be argued that although computer science may seem one of the best researched areas, it could also be one of the worst taught. In this research we examine the residual probl...
Des Traynor, J. Gibson
122
Voted
NIPS
2004
15 years 6 months ago
Outlier Detection with One-class Kernel Fisher Discriminants
The problem of detecting "atypical objects" or "outliers" is one of the classical topics in (robust) statistics. Recently, it has been proposed to address this...
Volker Roth