Sciweavers

1202 search results - page 86 / 241
» Robust system multiangulation using subspace methods
Sort
View
HOLOMAS
2007
Springer
15 years 4 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
COLING
1992
14 years 11 months ago
Interactive Speech Understanding
This paper introduces at robust interactive method for speech understatnding. The generatlized LR patrsing is enhanced ill this approach. Patrsing proceeds fl'om left to righ...
Hiroaki Saito
DI
2007
81views more  DI 2007»
14 years 9 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum
FCSC
2007
131views more  FCSC 2007»
14 years 9 months ago
SONNET: subscription using path queries over structured overlay networks
Application-level content-based routing using XML is a key technology for decentralized publish/subscribe systems. In this paper, a new approach is proposed to support the efficien...
Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou
AMFG
2003
IEEE
157views Biometrics» more  AMFG 2003»
15 years 3 months ago
Real-time View-based Face Alignment using Active Wavelet Networks
The Active Wavelet Network (AWN) [9] approach was recently proposed for automatic face alignment, showing advantages over Active Appearance Models (AAM), such as more robustness a...
Changbo Hu, Rogerio Feris, Matthew Turk