Sciweavers

1737 search results - page 291 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TVCG
2008
96views more  TVCG 2008»
14 years 11 months ago
Hand Motion Prediction for Distributed Virtual Environments
We use our hands to manipulate objects in our daily life. The hand is capable of accomplishing diverse tasks such as pointing, gripping, twisting, and tearing. However, there is no...
Addison Chan, Rynson W. H. Lau, Lewis W. F. Li

Book
640views
16 years 10 months ago
Introduction to Pattern Recognition
"Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typical...
Sargur Srihari
CCS
2005
ACM
15 years 5 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
NIPS
2000
15 years 1 months ago
Learning Winner-take-all Competition Between Groups of Neurons in Lateral Inhibitory Networks
It has long been known that lateral inhibition in neural networks can lead to a winner-take-all competition, so that only a single neuron is active at a steady state. Here we show...
Xiaohui Xie, Richard H. R. Hahnloser, H. Sebastian...
SPAA
2010
ACM
15 years 4 months ago
Online capacity maximization in wireless networks
In this paper we study a dynamic version of capacity maximization in the physical model of wireless communication. In our model, requests for connections between pairs of points i...
Alexander Fanghänel, Sascha Geulen, Martin Ho...