Sciweavers

257 search results - page 40 / 52
» connection 1999
Sort
View
RAID
1999
Springer
15 years 4 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
SAS
1999
Springer
116views Formal Methods» more  SAS 1999»
15 years 4 months ago
Decomposing Non-redundant Sharing by Complementation
Complementation, the inverse of the reduced product operation, is a technique for systemfinding minimal decompositions of abstract domains. Fil´e and Ranzato advanced the state ...
Enea Zaffanella, Patricia M. Hill, Roberto Bagnara
SCALESPACE
1999
Springer
15 years 4 months ago
Fast Marching to Moving Object Location
In this paper we address two important problems in motion analysis: the detection of moving objects and their localization. Statistical and level set approaches are adopted in orde...
Eftychios Sifakis, George Tziritas
137
Voted
IATA
1998
Springer
15 years 4 months ago
Development of a Multi-Agent System for Cooperative Work with Network Negotiation Capabilities
This paper describes the architecture and operation of a Multi Agent system for providing end users with an intelligent interface for video conference and cooperative work services...
Francisco J. Garijo, Juan Tous, José M. Mat...
IJCAI
2007
15 years 1 months ago
Ensembles of Partially Trained SVMs with Multiplicative Updates
The training of support vector machines (SVM) involves a quadratic programming problem, which is often optimized by a complicated numerical solver. In this paper, we propose a muc...
Ivor W. Tsang, James T. Kwok