Sciweavers

1244 search results - page 239 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
MM
1999
ACM
176views Multimedia» more  MM 1999»
15 years 4 months ago
Modeling focus of attention for meeting indexing
—A user’s focus of attention plays an important role in human–computer interaction applications, such as a ubiquitous computing environment and intelligent space, where the u...
Rainer Stiefelhagen, Jie Yang, Alex Waibel
IPSN
2007
Springer
15 years 5 months ago
MeshEye: a hybrid-resolution smart camera mote for applications in distributed intelligent surveillance
Surveillance is one of the promising applications to which smart camera motes forming a vision-enabled network can add increasing levels of intelligence. We see a high degree of i...
Stephan Hengstler, Daniel Prashanth, Sufen Fong, H...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 2 days ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
INFOCOM
2010
IEEE
14 years 9 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...
HIPC
2009
Springer
14 years 9 months ago
Comparing the performance of clusters, Hadoop, and Active Disks on microarray correlation computations
Abstract--Microarray-based comparative genomic hybridization (aCGH) offers an increasingly fine-grained method for detecting copy number variations in DNA. These copy number variat...
Jeffrey A. Delmerico, Nathanial A. Byrnes, Andrew ...