Sciweavers

3343 search results - page 411 / 669
» Network Objects
Sort
View
ACMSE
2005
ACM
15 years 8 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
JDCTA
2008
83views more  JDCTA 2008»
15 years 3 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong
ICDE
2012
IEEE
191views Database» more  ICDE 2012»
13 years 5 months ago
Processing and Notifying Range Top-k Subscriptions
— We consider how to support a large number of users over a wide-area network whose interests are characterized by range top-k continuous queries. Given an object update, we need...
Albert Yu, Pankaj K. Agarwal, Jun Yang 0001
AAAI
2007
15 years 5 months ago
Near-optimal Observation Selection using Submodular Functions
AI problems such as autonomous robotic exploration, automatic diagnosis and activity recognition have in common the need for choosing among a set of informative but possibly expen...
Andreas Krause, Carlos Guestrin
ACCV
2007
Springer
15 years 9 months ago
Calibrating Pan-Tilt Cameras with Telephoto Lenses
Abstract. Pan-tilt cameras are widely used in surveillance networks. These cameras are often equipped with telephoto lenses to capture objects at a distance. Such a camera makes fu...
Xinyu Huang, Jizhou Gao, Ruigang Yang