Sciweavers

1522 search results - page 228 / 305
» Distinctiveness of faces: A computational approach
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ESWS
2008
Springer
13 years 9 months ago
Semantic Reasoning: A Path to New Possibilities of Personalization
Abstract. Recommender systems face up to current information overload by selecting automatically items that match the personal preferences of each user. The so-called content-based...
Yolanda Blanco-Fernández, José J. Pa...
EUROIMSA
2006
141views Multimedia» more  EUROIMSA 2006»
13 years 9 months ago
Effective Organization and Visualization of Web Search Results
While searching the web, the user is often confronted by a great number of results, generally displayed in a list which is sorted according to the relevance of the results. Facing...
Nicolas Bonnel, Vincent Lemaire, Alexandre Cotarma...
MASCOTS
2004
13 years 9 months ago
Routing in an Internet-Scale Network Emulator
One of the primary challenges facing scalable network emulation and simulation is the overhead of storing network-wide routing tables or computing appropriate routes on a per-pack...
Jay Chen, Diwaker Gupta, Kashi Venkatesh Vishwanat...
VIP
2003
13 years 9 months ago
Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces
The Continuously Adaptive Mean Shift Algorithm (CamShift) is an adaptation of the Mean Shift algorithm for object tracking that is intended as a step towards head and face trackin...
John G. Allen, Richard Y. D. Xu, Jesse S. Jin