Sciweavers

9245 search results - page 1615 / 1849
» Virtualization
Sort
View
ISI
2008
Springer
15 years 3 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ISI
2008
Springer
15 years 3 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
134
Voted
IVC
2008
106views more  IVC 2008»
15 years 3 months ago
Attention links sensing to recognition
This paper presents arguments that explicit strategies for visual attentional selection are important for cognitive vision systems, and shows that a number of proposals currently ...
Albert L. Rothenstein, John K. Tsotsos
118
Voted
COR
2007
143views more  COR 2007»
15 years 3 months ago
Discrete bandwidth allocation considering fairness and transmission load in multicast networks
As a promising solution to tackle the network heterogeneity in multicasting, layered multicast protocols such as Receiver-driven layered multicast (RLM) and Layered video multicas...
Chae Y. Lee, Hee K. Cho

Publication
4052views
17 years 5 months ago
On the Extraction of Curve Skeletons using Gradient Vector Flow
In this paper, we propose a new variational framework for computing continuous curve skeletons from discrete objects that are suitable for structural shape representation. We have...
M. Sabry Hassouna, Aly A. Farag
« Prev « First page 1615 / 1849 Last » Next »