Sciweavers

1513 search results - page 173 / 303
» Cryptographic Pattern Matching
Sort
View
128
Voted
GBRPR
2007
Springer
15 years 6 months ago
Constellations and the Unsupervised Learning of Graphs
Abstract. In this paper, we propose a novel method for the unsupervised clustering of graphs in the context of the constellation approach to object recognition. Such method is an E...
Boyan Bonev, Francisco Escolano, Miguel Angel Loza...
ETRICS
2006
15 years 5 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
102
Voted
ICPR
2010
IEEE
15 years 5 months ago
Cluster-Pairwise Discriminant Analysis
Pattern recognition problems often suffer from the larger intra-class variation due to situation variations such as pose, walking speed, and clothing variations in gait recognition...
Yasushi Makihara, Yasushi Yagi
110
Voted
USENIX
2004
15 years 3 months ago
High Performance X Servers in the Kdrive Architecture
The common usage patterns of 2D drivers for the X Window System have changed over time. New extensions such as Render and Composite are creating new demands for 2D rendering which...
Eric Anholt
AINA
2007
IEEE
15 years 2 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang