Sciweavers

20833 search results - page 3982 / 4167
» Hidden process models
Sort
View
NOSSDAV
2010
Springer
15 years 8 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
140
Voted
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
15 years 8 months ago
Parallel community detection on large networks with propinquity dynamics
Graphs or networks can be used to model complex systems. Detecting community structures from large network data is a classic and challenging task. In this paper, we propose a nove...
Yuzhou Zhang, Jianyong Wang, Yi Wang, Lizhu Zhou
ECCV
2010
Springer
15 years 8 months ago
Analyzing Depth from Coded Aperture Sets
Computational depth estimation is a central task in computer vision and graphics. A large variety of strategies have been introduced in the past relying on viewpoint variations, de...
251
Voted
AGENTS
2001
Springer
15 years 8 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
ICANN
2001
Springer
15 years 8 months ago
A Network of Relaxation Oscillators that Finds Downbeats in Rhythms
A network of relaxation oscillators is used to find downbeats in rhythmical patterns. In this study, a novel model is described in detail. Its behavior is tested by exposing it to...
Douglas Eck
« Prev « First page 3982 / 4167 Last » Next »