Sciweavers

284 search results - page 48 / 57
» An Efficient Automatic Redeye Detection and Correction Algor...
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
ICPR
2008
IEEE
14 years 2 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
DAC
2007
ACM
14 years 8 months ago
Period Optimization for Hard Real-time Distributed Automotive Systems
The complexity and physical distribution of modern active-safety automotive applications requires the use of distributed architectures. These architectures consist of multiple ele...
Abhijit Davare, Qi Zhu, Marco Di Natale, Claudio P...
HT
2007
ACM
13 years 11 months ago
Toward interactive learning by concept ordering
In this paper we present a visual education tool for efficient and effective learning. The toolkit is based on a simple premise: simple concepts should be learned before advanced ...
Shantanu Godbole, Sachindra Joshi, Sameep Mehta, G...
JCIT
2008
124views more  JCIT 2008»
13 years 7 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das