Sciweavers

13631 search results - page 2401 / 2727
» Event-Based Performance Analysis
Sort
View
SASN
2004
ACM
15 years 10 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
SIGIR
2004
ACM
15 years 10 months ago
Length normalization in XML retrieval
XML retrieval is a departure from standard document retrieval in which each individual XML element, ranging from italicized words or phrases to full blown articles, is a potential...
Jaap Kamps, Maarten de Rijke, Börkur Sigurbj&...
DAGM
2004
Springer
15 years 10 months ago
Silhouette Based Human Motion Estimation
This paper proposes a system for model based human motion estimation. We start with a human model generation system, which uses a set of input images to automatically generate a f...
Bodo Rosenhahn, Reinhard Klette, Gerald Sommer
ESORICS
2004
Springer
15 years 10 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
201
Voted
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
15 years 10 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
« Prev « First page 2401 / 2727 Last » Next »