Sciweavers

5339 search results - page 1036 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 5 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
DEBS
2009
ACM
15 years 5 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
SIGGRAPH
2010
ACM
15 years 5 months ago
Camouflage images
Camouflage images contain one or more hidden figures that remain imperceptible or unnoticed for a while. In one possible explanation, the ability to delay the perception of the hi...
Hung-Kuo Chu, Wei-Hsin Hsu, Niloy J. Mitra, Daniel...
BMVC
2001
15 years 4 months ago
A Buyer's Guide to Euclidean Elliptical Cylindrical and Conical Surface Fitting
The ability to construct CAD or other object models from edge and range data has a fundamental meaning in building a recognition and positioning system. While the problem of model...
Petko Faber, Robert B. Fisher
AAAI
2008
15 years 4 months ago
Unknown Rewards in Finite-Horizon Domains
"Human computation" is a recent approach that extracts information from large numbers of Web users. reCAPTCHA is a human computation project that improves the process of...
Colin McMillen, Manuela M. Veloso
« Prev « First page 1036 / 1068 Last » Next »