Sciweavers

521 search results - page 102 / 105
» Mining Mobility Behavior from Trajectory Data
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
HRI
2011
ACM
14 years 1 months ago
Learning to interpret pointing gestures with a time-of-flight camera
Pointing gestures are a common and intuitive way to draw somebody’s attention to a certain object. While humans can easily interpret robot gestures, the perception of human beha...
David Droeschel, Jörg Stückler, Sven Beh...
JSSPP
2005
Springer
15 years 3 months ago
AnthillSched: A Scheduling Strategy for Irregular and Iterative I/O-Intensive Parallel Jobs
Irregular and iterative I/O-intensive jobs need a different approach from parallel job schedulers. The focus in this case is not only the processing requirements anymore: memory, ...
Luís Fabrício Wanderley Góes,...
AIPS
2003
14 years 11 months ago
A Multi-Agent System-driven AI Planning Approach to Biological Pathway Discovery
As genomic and proteomic data is collected from highthroughput methods on a daily basis, subcellular components are identified and their in vitro behavior is characterized. Howev...
Salim Khan, William Gillis, Carl Schmidt, Keith De...
CIKM
2006
Springer
15 years 1 months ago
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions
The blogosphere--the totality of blog-related Web sites-has become a great source of trend analysis in areas such as product survey, customer relationship, and marketing. Existing...
Yun Chi, Belle L. Tseng, Jun'ichi Tatemura