Sciweavers

1097 search results - page 41 / 220
» Sequential Object Monitors
Sort
View
HUMAN
2003
Springer
15 years 5 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
ICIP
2001
IEEE
16 years 1 months ago
Automatic monitoring of waste-water in industrial plants basins
We describe an algorithm for the analysis of color images of basins which gather dirty water, with the objective of detecting and estimate the presence of exceeding combustible oi...
Gaetano Baldini, Paola Campadelli, Raffaella Lanza...
ICMCS
2009
IEEE
85views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Text-independent compressed domain speaker verification for digital communication networks call monitoring
In this paper we present a text-independent automatic speaker verification system that works in the compressed domain using GSM AMR coded speech. While traditional approaches proc...
Matteo Petracca, Antonio Servetti, Juan Carlos De ...
SIGSOFT
2008
ACM
16 years 18 days ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
GIS
2010
ACM
14 years 10 months ago
Investigation of aggregation effects in vegetation condition monitoring at a national scale
Monitoring vegetation condition is an important issue in the Mediterranean region, in terms of both securing food and preventing fires. Vegetation indices (VIs), mathematical tran...
T. K. Alexandridis, T. Katagis, I. Z. Gitas, N. G....