Sciweavers

3750 search results - page 535 / 750
» Timed Automata Patterns
Sort
View
RAID
2009
Springer
15 years 9 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
121
Voted
MM
2009
ACM
144views Multimedia» more  MM 2009»
15 years 9 months ago
Peer-assisted view-dependent progressive mesh streaming
Progressive mesh streaming is increasingly used in 3D networked applications, such as online games, virtual worlds, and digital museums. To scale such applications to a large numb...
Wei Cheng, Dan Liu, Wei Tsang Ooi
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 9 months ago
Coverage control for nonholonomic agents
— Consider a coverage problem for a team of agents in the plane: target points appear sporadically over time in a bounded environment and must be visited by one of the agents. It...
John Enright, Ketan Savla, Emilio Frazzoli
DSN
2008
IEEE
15 years 9 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou
135
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Hybrid feature selection for gesture recognition using support vector machines
This paper presents an approach for a multi-cue based two-dimensional gesture recognition that combines two different forms of cues, namely shape cues and motion cues, in a suppor...
Yu Yuan, Kenneth Barner