Sciweavers

1993 search results - page 76 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
CVPR
2005
IEEE
15 years 12 months ago
Representational Oriented Component Analysis (ROCA) for Face Recognition with One Sample Image per Training Class
Subspace methods such as PCA, LDA, ICA have become a standard tool to perform visual learning and recognition. In this paper we propose Representational Oriented Component Analysi...
Fernando De la Torre, Ralph Gross, Simon Baker, B....
110
Voted
IEEEIAS
2009
IEEE
15 years 4 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
INFOCOM
2009
IEEE
15 years 4 months ago
Routing Fairness in Chord: Analysis and Enhancement
—In Peer-to-Peer (P2P) systems where stored objects are small, routing dominates the cost of publishing and retrieving an object. In such systems, the issue of fairly balancing t...
Rubén Cuevas Rumín, Manuel Urue&ntil...
CVPR
2007
IEEE
15 years 4 months ago
Trajectory Series Analysis based Event Rule Induction for Visual Surveillance
In this paper, a generic rule induction framework based on trajectory series analysis is proposed to learn the event rules. First the trajectories acquired by a tracking system ar...
Zhang Zhang, Kaiqi Huang, Tieniu Tan, Liangsheng W...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 3 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif