Sciweavers

1364 search results - page 121 / 273
» Data Level Inference Detection in Database Systems
Sort
View
CGO
2010
IEEE
15 years 6 months ago
Contention aware execution: online contention detection and response
Cross-core application interference due to contention for shared on-chip and off-chip resources pose a significant challenge to providing application level quality of service (Qo...
Jason Mars, Neil Vachharajani, Robert Hundt, Mary ...
100
Voted
ECCV
2010
Springer
15 years 2 months ago
A coarse-to-fine taxonomy of constellations for fast multi-class object detection
In order for recognition systems to scale to a larger number of object categories building visual class taxonomies is important to achieve running times logarithmic in the number o...
TASLP
2002
93views more  TASLP 2002»
15 years 14 days ago
Robust endpoint detection and energy normalization for real-time speech and speaker recognition
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
Qi Li, Jinsong Zheng, A. Tsai, Qiru Zhou
101
Voted
CIKM
2001
Springer
15 years 5 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 7 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...