Sciweavers

13336 search results - page 2491 / 2668
» Computer Vision: Algorithms and Applications
Sort
View
ISMIS
2005
Springer
15 years 9 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
MIDDLEWARE
2005
Springer
15 years 9 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
NOSSDAV
2005
Springer
15 years 9 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
PCM
2005
Springer
272views Multimedia» more  PCM 2005»
15 years 9 months ago
Fast Adaptive Skin Detection in JPEG Images
Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. To improve the accuracy and speed...
Qing-Fang Zheng, Wen Gao
PKDD
2005
Springer
94views Data Mining» more  PKDD 2005»
15 years 9 months ago
Visual Terrain Analysis of High-Dimensional Datasets
Abstract. Most real-world datasets are, to a certain degree, skewed. When considered that they are also large, they become the pinnacle challenge in data analysis. More importantly...
Wenyuan Li, Kok-Leong Ong, Wee Keong Ng
« Prev « First page 2491 / 2668 Last » Next »