Sciweavers

1585 search results - page 158 / 317
» Automatically optimizing secure computation
Sort
View
WACV
2005
IEEE
14 years 1 months ago
A Model-Based Interactive Object Segmentation Procedure
A global parametric shape model (boundary) of the object is optimized according to evidence accumulated from local features and the prior probability of the model parameters learn...
Jie Zou
IJCV
2002
141views more  IJCV 2002»
13 years 7 months ago
Spatio-Temporal Stereo Using Multi-Resolution Subdivision Surfaces
We present a method to automatically extract spatio-temporal descriptions of moving objects from synchronized and calibrated multi-view sequences. The object is modeled by a time-...
Jan Neumann, Yiannis Aloimonos
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 9 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
ISVC
2005
Springer
14 years 1 months ago
Mining Paths of Complex Crowd Scenes
The Ambient Intelligence (AmI) paradigm requires a robust interpretation of people actions and behaviour and a way for automatically generating persistent spatial-temporal models o...
Beibei Zhan, Paolo Remagnino, Sergio A. Velastin
RAID
2005
Springer
14 years 1 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti