Sciweavers

1017 search results - page 128 / 204
» A General Model for Authenticated Data Structures
Sort
View
ISNN
2005
Springer
14 years 2 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
CIKM
2010
Springer
13 years 7 months ago
Probabilistic ranking for relational databases based on correlations
This paper proposes a ranking method to exploit statistical correlations among pairs of attribute values in relational databases. For a given query, the correlations of the query ...
Jaehui Park, Sang-goo Lee
VIS
2003
IEEE
121views Visualization» more  VIS 2003»
14 years 10 months ago
Hierarchical Clustering for Unstructured Volumetric Scalar Fields
We present a method to represent unstructured scalar fields at multiple levels of detail. Using a parallelizable classification algorithm to build a cluster hierarchy, we generate...
Christopher S. Co, Bjørn Heckel, Hans Hagen...
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
14 years 2 months ago
SLAM using Incremental Probabilistic PCA and Dimensionality Reduction
— The recent progress in robot mapping (or SLAM) algorithms has focused on estimating either point features (such as landmarks) or grid-based representations. Both of these repre...
Emma Brunskill, Nicholas Roy
IJCV
1998
238views more  IJCV 1998»
13 years 8 months ago
Feature Detection with Automatic Scale Selection
The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the not...
Tony Lindeberg