Sciweavers

284 search results - page 28 / 57
» An Efficient Automatic Redeye Detection and Correction Algor...
Sort
View
IAJIT
2008
115views more  IAJIT 2008»
13 years 7 months ago
Optimal Fuzzy Clustering in Overlapping Clusters
: The fuzzy c-means clustering algorithm has been widely used to obtain the fuzzy k-partitions. This algorithm requires that the user gives the number of clusters k. To find automa...
Ouafae Ammor, Abdelmounim Lachkar, Khadija Slaoui,...
IJISEC
2006
106views more  IJISEC 2006»
13 years 7 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
PR
2006
78views more  PR 2006»
13 years 7 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
ICPR
2006
IEEE
14 years 8 months ago
Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation
This paper presents a fast and efficient method to determine intervertebral disk orientation in a magnetic resonance (MR) image of the spine. The algorithm originates from active ...
Amer Abufadel, Gregory G. Slabaugh, Gozde B. Unal,...
CCS
2008
ACM
13 years 9 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett