Sciweavers

2121 search results - page 209 / 425
» Experimental Analysis of BRDF Models
Sort
View
156
Voted
MSWIM
2009
ACM
15 years 10 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
DAC
2000
ACM
16 years 4 months ago
To split or to conjoin: the question in image computation
Image computation is the key step in fixpoint computations that are extensively used in model checking. Two techniques have been used for this step: one based on conjunction of the...
In-Ho Moon, James H. Kukula, Kavita Ravi, Fabio So...
113
Voted
KDD
2004
ACM
103views Data Mining» more  KDD 2004»
16 years 4 months ago
An objective evaluation criterion for clustering
We propose and test an objective criterion for evaluation of clustering performance: How well does a clustering algorithm run on unlabeled data aid a classification algorithm? The...
Arindam Banerjee, John Langford
129
Voted
ICIAP
2005
ACM
16 years 3 months ago
Learning Intrusion Detection: Supervised or Unsupervised?
Abstract. Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniq...
Pavel Laskov, Patrick Düssel, Christin Sch&au...
ICDAR
2009
IEEE
15 years 10 months ago
Text Localization in Natural Scene Images Based on Conditional Random Field
This paper proposes a novel hybrid method to robustly and accurately localize texts in natural scene images. A text region detector is designed to generate a text confidence map,...
Yi-Feng Pan, Xinwen Hou, Cheng-Lin Liu