Sciweavers

284 search results - page 28 / 57
» An Efficient Automatic Redeye Detection and Correction Algor...
Sort
View
IAJIT
2008
115views more  IAJIT 2008»
15 years 3 months ago
Optimal Fuzzy Clustering in Overlapping Clusters
: The fuzzy c-means clustering algorithm has been widely used to obtain the fuzzy k-partitions. This algorithm requires that the user gives the number of clusters k. To find automa...
Ouafae Ammor, Abdelmounim Lachkar, Khadija Slaoui,...
IJISEC
2006
106views more  IJISEC 2006»
15 years 3 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
PR
2006
78views more  PR 2006»
15 years 3 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...
121
Voted
ICPR
2006
IEEE
16 years 4 months ago
Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation
This paper presents a fast and efficient method to determine intervertebral disk orientation in a magnetic resonance (MR) image of the spine. The algorithm originates from active ...
Amer Abufadel, Gregory G. Slabaugh, Gozde B. Unal,...
CCS
2008
ACM
15 years 5 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett