Sciweavers

8080 search results - page 1354 / 1616
» From Computer Networks to Agent Networks
Sort
View
CVPR
2007
IEEE
16 years 7 months ago
Leveraging temporal, contextual and ordering constraints for recognizing complex activities in video
We present a scalable approach to recognizing and describing complex activities in video sequences. We are interested in long-term, sequential activities that may have several par...
Benjamin Laxton, Jongwoo Lim, David J. Kriegman
ICPR
2008
IEEE
16 years 6 months ago
A novel approach for the recognition of a wide Arabic handwritten word lexicon
This paper introduces a novel approach for the recognition of a wide vocabulary of Arabic handwritten words. Note that there is an essential difference between the global and anal...
Abdel Belaïd, Afef Kacem, Imen Ben Cheikh
ICPR
2006
IEEE
16 years 6 months ago
Competitive Mixtures of Simple Neurons
We propose a competitive finite mixture of neurons (or perceptrons) for solving binary classification problems. Our classifier includes a prior for the weights between different n...
Karthik Sridharan, Matthew J. Beal, Venu Govindara...
CHI
2006
ACM
16 years 5 months ago
Quantifying interpersonal influence in face-to-face conversations based on visual attention patterns
A novel measure for automatically quantifying the amount of interpersonal influence present in face-toface conversations is proposed based on the visualattention patterns of the p...
Kazuhiro Otsuka, Junji Yamato, Yoshinao Takemae, H...
ICDCS
2009
IEEE
16 years 2 months ago
The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
Chia-Wei Chang, Seungjoon Lee, B. Lin, Jia Wang
« Prev « First page 1354 / 1616 Last » Next »