Sciweavers

350 search results - page 41 / 70
» A Component-Labeling Algorithm Using Contour Tracing Techniq...
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
DEXA
2008
Springer
137views Database» more  DEXA 2008»
13 years 10 months ago
A Grid-Based Multi-relational Approach to Process Mining
Abstract. Industrial, scientific, and commercial applications use information systems to trace the execution of a business process. Relevant events are registered in massive logs a...
Antonio Turi, Annalisa Appice, Michelangelo Ceci, ...
LCTRTS
2010
Springer
14 years 3 months ago
Sampling-based program execution monitoring
For its high overall cost during product development, program debugging is an important aspect of system development. Debugging is a hard and complex activity, especially in time-...
Sebastian Fischmeister, Yanmeng Ba
CGI
2001
IEEE
14 years 4 days ago
Hardware-Accelerated Rendering of Antialiased Shadows with Shadow Maps
We present a hardware-accelerated method for rendering high quality, antialiased shadows using the shadow map approach. Instead of relying on dedicated hardware support for shadow...
Stefan Brabec, Hans-Peter Seidel
DAGSTUHL
1997
13 years 9 months ago
Ray-Based Data Level Comparisons of Direct Volume Rendering Algorithms
This paper describes and demonstrates the e ectiveness of several metrics for data level comparison of direct volume rendering (DVR) algorithms. The focus is not on speed ups from...
Kwansik Kim, Alex Pang