Sciweavers

7623 search results - page 1504 / 1525
» Constructive Volume Modeling
Sort
View
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
CORR
2007
Springer
126views Education» more  CORR 2007»
14 years 9 months ago
Optimal Throughput-Diversity-Delay Tradeoff in MIMO ARQ Block-Fading Channels
In this paper, we consider an automatic-repeat-request (ARQ) retransmission protocol signaling over a block-fading multiple-input, multiple-output (MIMO) channel. Unlike previous ...
Allen Chuang, Albert Guillen i Fabregas, Lars K. R...
75
Voted
CVIU
2007
174views more  CVIU 2007»
14 years 9 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
JUCS
2008
112views more  JUCS 2008»
14 years 9 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
JUCS
2008
143views more  JUCS 2008»
14 years 9 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
« Prev « First page 1504 / 1525 Last » Next »