Sciweavers

7351 search results - page 1287 / 1471
» Machine Learning
Sort
View
124
Voted
HPDC
2008
IEEE
15 years 9 months ago
Issues in applying data mining to grid job failure detection and diagnosis
As grid computation systems become larger and more complex, manually diagnosing failures in jobs becomes impractical. Recently, machine-learning techniques have been proposed to d...
Lakshmikant Shrinivas, Jeffrey F. Naughton
ICDCSW
2008
IEEE
15 years 9 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
145
Voted
ICEIS
2008
IEEE
15 years 9 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
124
Voted
ICIP
2008
IEEE
15 years 9 months ago
Gradual transition detection using color coherence and other criteria in a video shot meta-segmentation framework
Shot segmentation provides the basis for almost all high-level video content analysis approaches, validating it as one of the major prerequisites for efficient video semantic ana...
Efthymia Tsamoura, Vasileios Mezaris, Ioannis Komp...
121
Voted
ICPR
2008
IEEE
15 years 9 months ago
On second order operators and quadratic operators
In pattern recognition, computer vision, and image processing, many approaches are based on second order operators. Well-known examples are second order networks, the 3D structure...
Michael Felsberg
« Prev « First page 1287 / 1471 Last » Next »