Sciweavers

78 search results - page 12 / 16
» Computational Force: A Unifying Concept for Scalability Anal...
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ESCIENCE
2006
IEEE
14 years 7 days ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
ICCV
2005
IEEE
14 years 2 months ago
Resolving Hand over Face Occlusion
Abstract. This paper presents a method to segment the hand over complex backgrounds, such as the face. The similar colors and texture of the hand and face make the problem particul...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
COLING
2002
13 years 8 months ago
Effective Structural Inference for Large XML Documents
This paper investigates methods to automatically infer structural information from large XML documents. Using XML as a reference format, we approach the schema generation problem ...
Jason Sankey, Raymond K. Wong
ICPR
2010
IEEE
14 years 21 days ago
Efficient Semantic Indexing for Image Retrieval
Semantic analysis of a document collection can be viewed as an unsupervised clustering of the constituent words and documents around hidden or latent concepts. This has shown to i...
Chandrika Pulla, Suman Karthik, C. V. Jawahar