Sciweavers

854 search results - page 131 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
JIPS
2010
195views more  JIPS 2010»
14 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ICIP
2000
IEEE
15 years 11 months ago
LIP Contour Extraction Using a Deformable Model
The use of visual information from lip movements can improve the accuracy and robustness of a speech recognition system. Accurate extraction of visual features associated with the...
Alan Wee-Chung Liew, Shu Hung Leung, Wing Hong Lau
157
Voted
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
15 years 11 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
VIS
2007
IEEE
123views Visualization» more  VIS 2007»
15 years 11 months ago
Multifield Visualization Using Local Statistical Complexity
Modern unsteady (multi-)field visualizations require an effective reduction of the data to be displayed. From a huge amount of information the most informative parts have to be ext...
Heike Jänicke, Alexander Wiebel, Gerik Scheuerm...
PERCOM
2007
ACM
15 years 9 months ago
The Role of Probabilistic Schemes in Multisensor Context-Awareness
This paper investigates the role of existing "probabilistic" schemes to reason about various everyday situations on the basis of data from multiple heterogeneous physical...
Waltenegus Dargie