Sciweavers

129 search results - page 25 / 26
» Edge Detection Based on Spiking Neural Network Model
Sort
View
HAIS
2010
Springer
14 years 22 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
NIPS
2008
13 years 9 months ago
Natural Image Denoising with Convolutional Networks
We present an approach to low-level vision that combines two main ideas: the use of convolutional networks as an image processing architecture and an unsupervised learning procedu...
Viren Jain, H. Sebastian Seung
KAIS
2011
129views more  KAIS 2011»
13 years 2 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis
AINA
2010
IEEE
14 years 1 months ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...
IJCNN
2008
IEEE
14 years 2 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn