Sciweavers

1984 search results - page 358 / 397
» Binary Component Adaptation
Sort
View
CN
1999
115views more  CN 1999»
14 years 9 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
JVCA
2002
157views more  JVCA 2002»
14 years 9 months ago
Realistic face animation for speech
We propose an efficient system for realistic speech animation. The system supports all steps of the animation pipeline, from the capture or design of 3D head models up to the synth...
Gregor A. Kalberer, Luc J. Van Gool
99
Voted
TMI
1998
181views more  TMI 1998»
14 years 9 months ago
Image Contrast Enhancement Based on a Histogram Transformation of Local Standard Deviation
Abstract— The adaptive contrast enhancement (ACE) algorithm, which uses contrast gains (CG’s) to adjust the highfrequency components of images, is a well-known technique for me...
Dah-Chung Chang, Wen-Rong Wu
ENTCS
2007
190views more  ENTCS 2007»
14 years 9 months ago
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
We suggest a formal model to represent and solve the multicast routing problem in multicast networks. To attain this, we model the network adapting it to a weighted and-or graph, ...
Stefano Bistarelli, Ugo Montanari, Francesca Rossi...
79
Voted
CIKM
2010
Springer
14 years 8 months ago
Brown dwarf: a P2P data-warehousing system
In this demonstration we present the Brown Dwarf, a distributed system designed to efficiently store, query and update multidimensional data. Deployed on any number of commodity ...
Katerina Doka, Dimitrios Tsoumakos, Nectarios Kozi...