It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
Studies of image motion typically address motion categories on a case-by-case basis. Examples include a moving point, a moving contour, or a 2D optical flow field. The typical ass...
In service oriented computing different techniques for monitoring Service Level Agreements (SLAs) are available. Many of these monitoring approaches focus on bilateral agreements ...
Lianne Bodenstaff, Andreas Wombacher, Manfred Reic...
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...