Sciweavers

492 search results - page 74 / 99
» Empirical Comparison of
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 11 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
ICWS
2007
IEEE
14 years 11 days ago
Improved Adaptation of Web Service Compositions Using Value of Changed Information
Workflows often operate in volatile environments in which the component services’ QoS changes frequently. Optimally adapting to these changes becomes an important problem that ...
Girish Chafle, Prashant Doshi, John Harney, Sumit ...
IJCV
2006
115views more  IJCV 2006»
13 years 11 months ago
Object Recognition as Many-to-Many Feature Matching
Object recognition can be formulated as matching image features to model features. When recognition is exemplar-based, feature correspondence is one-to-one. However, segmentation e...
M. Fatih Demirci, Ali Shokoufandeh, Yakov Keselman...
ICCV
2011
IEEE
12 years 11 months ago
Spatiotemporal Oriented Energies for Spacetime Stereo
This paper presents a novel approach to recovering temporally coherent estimates of 3D structure of a dynamic scene from a sequence of binocular stereo images. The approach is bas...
Mikhail Sizintsev, Richard Wildes
ICML
2007
IEEE
14 years 11 months ago
Recovering temporally rewiring networks: a model-based approach
A plausible representation of relational information among entities in dynamic systems such as a living cell or a social community is a stochastic network which is topologically r...
Fan Guo, Steve Hanneke, Wenjie Fu, Eric P. Xing