Sciweavers

683 search results - page 39 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
104
Voted
CCE
2006
15 years 19 days ago
New approaches for representing, analyzing and visualizing complex kinetic transformations
Complex kinetic mechanisms involving thousands of reacting species and tens of thousands of reactions are currently required for the rational analysis of modern combustion systems...
Ioannis P. Androulakis
76
Voted
NOLISP
2007
Springer
15 years 6 months ago
On the Usefulness of Linear and Nonlinear Prediction Residual Signals for Speaker Recognition
This paper compares the identification rates of a speaker recognition system using several parameterizations, with special emphasis on the residual signal obtained from linear and...
Marcos Faúndez-Zanuy
DEBS
2008
ACM
15 years 2 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
114
Voted
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Resource-adaptive multimedia analysis on stream mining systems
Large-scale multimedia semantic concept detection requires realtime identification of a set of concepts in streaming video or large image datasets. The potentially high data volum...
Deepak S. Turaga, Rong Yan, Olivier Verscheure, Br...
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 1 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn