Sciweavers

1437 search results - page 154 / 288
» Content Extraction Signatures
Sort
View
SETN
2004
Springer
14 years 3 months ago
Computationally Intelligent Methods for Mining 3D Medical Images
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
Despina Kontos, Vasileios Megalooikonomou, Fillia ...
ICDAR
2003
IEEE
14 years 3 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang
ICIP
2002
IEEE
14 years 3 months ago
Detection and segmentation of sweeps in color graphics images
Business graphics are an important class of digital imagery. Such images are computer-generated, and comprise synthetic elements such as solid fills, line art, and color sweeps. O...
Salil Prabhakar, Hui Cheng, Raja Bala, John C. Han...
ACSAC
2004
IEEE
14 years 1 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ACSAC
2004
IEEE
14 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna