Sciweavers

3218 search results - page 347 / 644
» Tracking Climate Models
Sort
View
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 11 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
ICRA
2006
IEEE
139views Robotics» more  ICRA 2006»
15 years 11 months ago
Adaptive Geometric Templates for Feature Matching
Robust motion recovery in tracking multiple targets using image features is affected by difficulties in obtaining good correspondences over long sequences. Difficulties are intr...
Harini Veeraraghavan, Paul R. Schrater, Nikolaos P...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
TREC
1998
15 years 6 months ago
ClickIR: Text Retrieval using a Dynamic Hypertext Interface
In this report we describe our model of dynamic hypertext and how the ClickIR system uses this model to assist users in interactive search. The system was used in both the ad hoc ...
Richard C. Bodner, Mark H. Chignell
ISI
2008
Springer
15 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....