Sciweavers

1274 search results - page 237 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
CCECE
2006
IEEE
14 years 1 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
ECIR
2008
Springer
13 years 9 months ago
Clustering Template Based Web Documents
More and more documents on the World Wide Web are based on templates. On a technical level this causes those documents to have a quite similar source code and DOM tree structure. G...
Thomas Gottron
VISUALIZATION
2002
IEEE
14 years 13 days ago
Exploring Scalar Fields Using Critical Isovalues
Isosurfaces are commonly used to visualize scalar fields. Critical isovalues indicate isosurface topology changes: the creation of new surface components, merging of surface comp...
Gunther H. Weber, Gerik Scheuermann, Hans Hagen, B...
ECCV
2006
Springer
13 years 11 months ago
SIFT and Shape Context for Feature-Based Nonlinear Registration of Thoracic CT Images
Nonlinear image registration is a prerequisite for various medical image analysis applications. Many data acquisition protocols suffer from problems due to breathing motion which h...
Martin Urschler, Joachim Bauer, Hendrik Ditt, Hors...
CVIU
2004
125views more  CVIU 2004»
13 years 7 months ago
Automatic description of complex buildings from multiple images
We present an approach for detecting and describing complex buildings with flat or complex rooftops by using multiple, overlapping images of the scene. We find 3-D rooftop boundar...
Zu Whan Kim, Ramakant Nevatia