Sciweavers

1437 search results - page 31 / 288
» Content Extraction Signatures
Sort
View
ICPR
2002
IEEE
14 years 9 months ago
Video Editing Support System Based on Video Grammar and Content Analysis
Video editing is the work to produce the final videos with certain duration by finding and selecting appropriate shots from the material videos and connecting them. In order to pr...
Masahito Kumano, Yasuo Ariki, Miki Amano, Kuniaki ...
ICPR
2006
IEEE
14 years 9 months ago
A Novel Human Gait Recognition Method by Segmenting and Extracting the Region Variance Feature
Existing methods of gait recognition suffer from some shortcomings, which are discussed at the beginning of the full paper. In order to suppress these shortcomings as much as poss...
Yanmei Chai, Qing Wang, Jingping Jia, Rongchun Zha...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
KR
2010
Springer
14 years 1 months ago
Pushing the Limits of Reasoning over Ontologies with Hidden Content
There is currently a growing interest in techniques for hiding parts of the signature of an ontology Kh that is being reused by another ontology Kv. Towards this goal, Cuenca Grau...
Bernardo Cuenca Grau, Boris Motik
FCCM
2004
IEEE
269views VLSI» more  FCCM 2004»
14 years 7 days ago
FPGA Based Network Intrusion Detection using Content Addressable Memories
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
Long Bu, John A. Chandy