Sciweavers

868 search results - page 113 / 174
» Using concept analysis to detect co-change patterns
Sort
View
136
Voted
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis
Multimodal speech and speaker modeling and recognition are widely accepted as vital aspects of state of the art human-machine interaction systems. While correlations between speec...
Mehmet Emre Sargin, Oya Aran, Alexey Karpov, Ferda...
140
Voted
CAI
2010
Springer
15 years 1 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
130
Voted
TNC
2004
120views Education» more  TNC 2004»
15 years 5 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
127
Voted
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
118
Voted
CVPR
2007
IEEE
16 years 5 months ago
Recognizing Night Walkers Based on One Pseudoshape Representation of Gait
Gait is a promising biometric cue which can facilitate the recognition of human beings, particularly when other biometrics are unavailable. Existing work for gait recognition, how...
Daoliang Tan, Kaiqi Huang, Shiqi Yu, Tieniu Tan