Sciweavers

6368 search results - page 1222 / 1274
» Modeling Problem Transformations based on Data Complexity
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ECTEL
2007
Springer
15 years 4 months ago
Creation of Lithuanian Digital Library of Educational Resources and Services: the Hypothesis, Contemporary Practice, and Future
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Eugenijus Kurilovas, Svetlana Kubilinskiene
BMCBI
2006
142views more  BMCBI 2006»
14 years 9 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
CGF
2006
145views more  CGF 2006»
14 years 9 months ago
Classification of Illumination Methods for Mixed Reality
A mixed reality (MR) represents an environment composed both by real and virtual objects. MR applications are used more and more, for instance in surgery, architecture, cultural h...
Katrien Jacobs, Céline Loscos
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 4 months ago
View-adaptive manipulative action recognition for robot companions
— This paper puts forward an approach for a mobile robot to recognize the human’s manipulative actions from different single camera views. While most of the related work in act...
Zhe Li, Sven Wachsmuth, Jannik Fritsch, Gerhard Sa...
« Prev « First page 1222 / 1274 Last » Next »