Sciweavers

401 search results - page 73 / 81
» Prototype based outlier detection
Sort
View
MIDDLEWARE
2010
Springer
14 years 8 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
CNSM
2010
14 years 6 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
93
Voted
AWIC
2011
Springer
14 years 1 months ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
IWINAC
2011
Springer
14 years 16 days ago
Clustering of Trajectories in Video Surveillance Using Growing Neural Gas
Abstract. One of the more important issues in intelligent video surveillance systems is the ability to handle events from the motion of objects. Thus, the classification of the tr...
Javier Acevedo-Rodríguez, Saturnino Maldona...
IUI
2010
ACM
15 years 4 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka