Sciweavers

7544 search results - page 1344 / 1509
» Network Forensics Analysis
Sort
View
129
Voted
ETFA
2006
IEEE
15 years 10 months ago
Investigating Connector Faults in the Time-Triggered Architecture
In the context of distributed real-time systems as deployed in the avionic and the automotive domain a substantial number of system malfunctions result from connector faults. For ...
Philipp Peti, Roman Obermaisser, Harald Paulitsch
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 10 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
ICDCS
2006
IEEE
15 years 10 months ago
A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe
Publish/Subscribe systems provide a useful platform for delivering data (events) from publishers to subscribers in an anonymous fashion in distributed networks. In this paper, we ...
Emmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar ...
ICMCS
2006
IEEE
177views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Mixed Type Audio Classification with Support Vector Machine
Content-based classification of audio data is an important problem for various applications such as overall analysis of audio-visual streams, boundary detection of video story se...
Lei Chen 0002, Sule Gündüz, M. Tamer &Ou...
IJCNN
2006
IEEE
15 years 10 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
« Prev « First page 1344 / 1509 Last » Next »