Sciweavers

1424 search results - page 182 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
JAISE
2011
238views more  JAISE 2011»
14 years 8 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
DAC
2005
ACM
16 years 2 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
ISSTA
2009
ACM
15 years 6 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
DSS
2007
76views more  DSS 2007»
15 years 1 months ago
Deadline-based escalation in process-aware information systems
Process-aware information systems are typically driven by process models capturing an idealized view of the actual processes. For example, most process models assume that planned ...
Wil M. P. van der Aalst, Michael Rosemann, Marlon ...
FGR
2008
IEEE
165views Biometrics» more  FGR 2008»
15 years 3 months ago
Efficient approximations to model-based joint tracking and recognition of continuous sign language
We propose several tracking adaptation approaches to recover from early tracking errors in sign language recognition by optimizing the obtained tracking paths w.r.t. to the hypoth...
Philippe Dreuw, Jens Forster, Thomas Deselaers, He...