Sciweavers

412 search results - page 39 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
SIMUTOOLS
2008
13 years 9 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
ENGL
2008
133views more  ENGL 2008»
13 years 7 months ago
Cycle Time Forecasting Models for Defect Inspection Process in TFT-LCD Module Assembly
Because most of the procedures in defect inspection process of TFT-LCD module assembly are examined manually through human vision, cycle time estimation for this particular process...
Chien-wen Shen
ESANN
2006
13 years 9 months ago
Using Regression Error Characteristic Curves for Model Selection in Ensembles of Neural Networks
Regression Error Characteristic (REC) analysis is a technique for evaluation and comparison of regression models that facilitates the visualization of the performance of many regre...
Aloísio Carlos de Pina, Gerson Zaverucha
MICCAI
2004
Springer
14 years 8 months ago
Real-Time Multi-model Tracking of Myocardium in Echocardiography Using Robust Information Fusion
Automatic myocardial wall motion tracking in ultrasound images is an important step in analysis of the heart function. Existing methods for Myocardial Wall Tracking are not robust ...
Bogdan Georgescu, Xiang Sean Zhou, Dorin Comaniciu...
ACSAC
2002
IEEE
14 years 20 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti