Sciweavers

3322 search results - page 604 / 665
» Automatic Human Model Generation
Sort
View
PERCOM
2009
ACM
15 years 4 months ago
A Dynamic Platform for Runtime Adaptation
—We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive m...
Hubert Pham, Justin Mazzola Paluska, Umar Saif, Ch...
ARC
2009
Springer
140views Hardware» more  ARC 2009»
15 years 4 months ago
FPGA-Based Anomalous Trajectory Detection Using SOFM
A system for automatically classifying the trajectory of a moving object in a scene as usual or suspicious is presented. The system uses an unsupervised neural network (Self Organi...
Kofi Appiah, Andrew Hunter, Tino Kluge, Philip Aik...
62
Voted
ICIW
2009
IEEE
15 years 4 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
IISWC
2009
IEEE
15 years 4 months ago
Logicalization of communication traces from parallel execution
—Communication traces are integral to performance modeling and analysis of parallel programs. However, execution on a large number of nodes results in a large trace volume that i...
Qiang Xu, Jaspal Subhlok, Rong Zheng, Sara Voss
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng