Sciweavers

2230 search results - page 90 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
CSREASAM
2006
15 years 3 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
117
Voted
CVPR
2007
IEEE
15 years 8 months ago
Multiple Target Tracking Using Spatio-Temporal Markov Chain Monte Carlo Data Association
We propose a framework for general multiple target tracking, where the input is a set of candidate regions in each frame, as obtained from a state of the art background learning, ...
Qian Yu, Gérard G. Medioni, Isaac Cohen
KCAP
2009
ACM
15 years 8 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...
WACV
2005
IEEE
15 years 7 months ago
Epipolar Constraints for Vision-Aided Inertial Navigation
— This paper describes a new method to improve inertial navigation using feature-based constraints from one or more video cameras. The proposed method lengthens the period of tim...
David D. Diel, Paul DeBitetto, Seth J. Teller
109
Voted
HYBRID
2001
Springer
15 years 6 months ago
Assume-Guarantee Reasoning for Hierarchical Hybrid Systems
Abstract. The assume-guarantee paradigm is a powerful divide-andconquer mechanism for decomposing a veri cation task about a system into subtasks about the individual components of...
Thomas A. Henzinger, Marius Minea, Vinayak S. Prab...