Sciweavers

1274 search results - page 234 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
USS
2010
13 years 7 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
ICCV
2009
IEEE
15 years 2 months ago
Shape Guided Contour Grouping with Particle Filters
We propose a novel framework for contour based object detection and recognition, which we formulate as a joint contour fragment grouping and labeling problem. For a given set of...
ChengEn Lu, Longin Jan Latecki, Nagesh Adluru, Hai...
CIKM
2008
Springer
13 years 11 months ago
Probabilistic polyadic factorization and its application to personalized recommendation
Multiple-dimensional, i.e., polyadic, data exist in many applications, such as personalized recommendation and multipledimensional data summarization. Analyzing all the dimensions...
Yun Chi, Shenghuo Zhu, Yihong Gong, Yi Zhang
ECCV
2000
Springer
14 years 11 months ago
Regularised Range Flow
Extending a differential total least squares method for range flow estimation we present an iterative regularisation approach to compute dense range flow fields. We demonstrate how...
Bernd Jähne, Hagen Spies, John L. Barron
LCN
2006
IEEE
14 years 3 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz