Sciweavers

1541 search results - page 285 / 309
» Dynamic Feedback: An Effective Technique for Adaptive Comput...
Sort
View
109
Voted
RAID
2007
Springer
15 years 6 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
95
Voted
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
15 years 6 months ago
Panel Session
 The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...
109
Voted
IEEEPACT
2005
IEEE
15 years 6 months ago
Communication Optimizations for Fine-Grained UPC Applications
Global address space languages like UPC exhibit high performance and portability on a broad class of shared and distributed memory parallel architectures. The most scalable applic...
Wei-Yu Chen, Costin Iancu, Katherine A. Yelick
99
Voted
DSOM
2003
Springer
15 years 5 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
133
Voted
FGR
2002
IEEE
228views Biometrics» more  FGR 2002»
15 years 5 months ago
Real-Time Tracking of Multiple Fingertips and Gesture Recognition for Augmented Desk Interface Systems
In this paper, we propose a fast and robust method for tracking a user’s hand and multiple fingertips; we then demonstrate gesture recognition based on measured fingertip traj...
Kenji Oka, Yoichi Sato, Hideki Koike