Sciweavers

1748 search results - page 242 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
CVPR
2005
IEEE
16 years 5 months ago
Vehicle Segmentation and Tracking from a Low-Angle Off-Axis Camera
We present a novel method for visually monitoring a highway when the camera is relatively low to the ground and on the side of the road. In such a case, occlusion and the perspect...
Neeraj K. Kanhere, Shrinivas J. Pundlik, Stan Birc...
LCN
2007
IEEE
15 years 9 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
ICASSP
2010
IEEE
15 years 3 months ago
Improved statistical models for SMT-based speaking style transformation
Automatic speech recognition (ASR) results contain not only ASR errors, but also disfluencies and colloquial expressions that must be corrected to create readable transcripts. We...
Graham Neubig, Yuya Akita, Shinsuke Mori, Tatsuya ...
IJDSN
2006
136views more  IJDSN 2006»
15 years 3 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IR
2006
15 years 3 months ago
Table extraction for answer retrieval
The ability to find tables and extract information from them is a necessary component of many information retrieval tasks. Documents often contain tables in order to communicate d...
Xing Wei, W. Bruce Croft, Andrew McCallum