Sciweavers

5948 search results - page 1157 / 1190
» Computing Robust Counter-Strategies
Sort
View
BTW
2007
Springer
154views Database» more  BTW 2007»
15 years 4 months ago
Integrating Query-Feedback Based Statistics into Informix Dynamic Server
: Statistics that accurately describe the distribution of data values in the columns of relational tables are essential for effective query optimization in a database management sy...
Alexander Behm, Volker Markl, Peter J. Haas, Kesha...
CCS
2007
ACM
15 years 4 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CIKM
2007
Springer
15 years 4 months ago
Query expansion using probabilistic local feedback with application to multimedia retrieval
As one of the most effective query expansion approaches, local feedback is able to automatically discover new query terms and improve retrieval accuracy for different retrieval ...
Rong Yan, Alexander G. Hauptmann
DCOSS
2007
Springer
15 years 4 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
DCOSS
2007
Springer
15 years 4 months ago
Distributed Coalition Formation in Visual Sensor Networks: A Virtual Vision Approach
Abstract. We propose a distributed coalition formation strategy for collaborative sensing tasks in camera sensor networks. The proposed model supports taskdependent node selection ...
Faisal Qureshi, Demetri Terzopoulos
« Prev « First page 1157 / 1190 Last » Next »