Sciweavers

1141 search results - page 86 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
119
Voted
CCS
2008
ACM
15 years 2 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 6 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
ICCV
2001
IEEE
16 years 2 months ago
Dimensional Analysis of Image Motion
Studies of image motion typically address motion categories on a case-by-case basis. Examples include a moving point, a moving contour, or a 2D optical flow field. The typical ass...
Michael S. Langer, Richard Mann
IEEESCC
2008
IEEE
15 years 7 months ago
Monitoring Dependencies for SLAs: The MoDe4SLA Approach
In service oriented computing different techniques for monitoring Service Level Agreements (SLAs) are available. Many of these monitoring approaches focus on bilateral agreements ...
Lianne Bodenstaff, Andreas Wombacher, Manfred Reic...
133
Voted
AAAI
2006
15 years 2 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy