Sciweavers

3343 search results - page 246 / 669
» Network Objects
Sort
View
ICPR
2008
IEEE
16 years 5 months ago
Exploiting qualitative domain knowledge for learning Bayesian network parameters with incomplete data
When a large amount of data are missing, or when multiple hidden nodes exist, learning parameters in Bayesian networks (BNs) becomes extremely difficult. This paper presents a lea...
Qiang Ji, Wenhui Liao
ICPR
2006
IEEE
16 years 5 months ago
ViSE: Visual Search Engine Using Multiple Networked Cameras
We propose a Visual Search Engine (ViSE) as a semi-automatic component in a surveillance system using networked cameras. The ViSE aims to assist the monitoring operation of huge a...
Anil K. Jain, Itaru Kitahara, Kiyoshi Kogure, Nori...
HYBRID
2009
Springer
15 years 10 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
ICC
2009
IEEE
119views Communications» more  ICC 2009»
15 years 10 months ago
Secure Signaling in Next Generation Networks with NSIS
—The IETF working group Next Steps in Signaling (NSIS) develops signaling protocols for Quality-of-Service (QoS) reservations or dynamic NAT and firewall (NAT/FW) configuration...
Roland Bless, Martin Röhricht
RECONFIG
2009
IEEE
165views VLSI» more  RECONFIG 2009»
15 years 10 months ago
Composable and Persistent-State Application Swapping on FPGAs Using Hardwired Network on Chip
—We envision that future FPGA will use a hardwired network on chip (HWNoC) [14] as a unified interconnect for functional communications (data and control) as well as configurat...
Muhammad Aqeel Wahlah, Kees G. W. Goossens