Sciweavers

257 search results - page 40 / 52
» connection 1999
Sort
View
RAID
1999
Springer
15 years 1 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
SAS
1999
Springer
116views Formal Methods» more  SAS 1999»
15 years 1 months ago
Decomposing Non-redundant Sharing by Complementation
Complementation, the inverse of the reduced product operation, is a technique for systemfinding minimal decompositions of abstract domains. Fil´e and Ranzato advanced the state ...
Enea Zaffanella, Patricia M. Hill, Roberto Bagnara
SCALESPACE
1999
Springer
15 years 1 months ago
Fast Marching to Moving Object Location
In this paper we address two important problems in motion analysis: the detection of moving objects and their localization. Statistical and level set approaches are adopted in orde...
Eftychios Sifakis, George Tziritas
105
Voted
IATA
1998
Springer
15 years 1 months ago
Development of a Multi-Agent System for Cooperative Work with Network Negotiation Capabilities
This paper describes the architecture and operation of a Multi Agent system for providing end users with an intelligent interface for video conference and cooperative work services...
Francisco J. Garijo, Juan Tous, José M. Mat...
81
Voted
IJCAI
2007
14 years 11 months ago
Ensembles of Partially Trained SVMs with Multiplicative Updates
The training of support vector machines (SVM) involves a quadratic programming problem, which is often optimized by a complicated numerical solver. In this paper, we propose a muc...
Ivor W. Tsang, James T. Kwok