Sciweavers

240 search results - page 39 / 48
» A Geometric Approach for Regularization of the Data Term in ...
Sort
View
CCS
2006
ACM
14 years 11 days ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
MASCOTS
2004
13 years 10 months ago
Architecture Independent Performance Characterization and Benchmarking for Scientific Applications
A simple, tunable, synthetic benchmark with a performance directly related to applications would be of great benefit to the scientific computing community. In this paper, we prese...
Erich Strohmaier, Hongzhang Shan
TITB
2008
151views more  TITB 2008»
13 years 8 months ago
Shape-Driven Segmentation of the Arterial Wall in Intravascular Ultrasound Images
Segmentation of arterial wall boundaries from intravascular images is an important problem for many applications in the study of plaque characteristics, mechanical properties of t...
Gozde B. Unal, S. Bucher, Stephane G. Carlier, Gre...
ECCV
2010
Springer
13 years 9 months ago
Fast and Exact Primal-Dual Iterations for Variational Problems in Computer Vision
The saddle point framework provides a convenient way to formulate many convex variational problems that occur in computer vision. The framework unifies a broad range of data and re...
Jan Lellmann, Dirk Breitenreicher, Christoph Schn&...
CAV
2011
Springer
253views Hardware» more  CAV 2011»
13 years 6 days ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...