Sciweavers

58 search results - page 9 / 12
» Experimental validation of a tuning algorithm for high-speed...
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 1 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
SIGIR
2003
ACM
14 years 21 days ago
Text categorization by boosting automatically extracted concepts
Term-based representations of documents have found widespread use in information retrieval. However, one of the main shortcomings of such methods is that they largely disregard le...
Lijuan Cai, Thomas Hofmann
MOBIWAC
2006
ACM
14 years 1 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
ICPR
2010
IEEE
13 years 11 months ago
Monogenic Binary Pattern (MBP): A Novel Feature Extraction and Representation Model for Face Recognition
A novel feature extraction method, namely monogenic binary pattern (MBP), is proposed in this paper based on the theory of monogenic signal analysis, and the histogram of MBP (HMB...
Meng Yang, Lei Zhang, Lin Zhang, David Zhang
ICMCS
2009
IEEE
218views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Multi-view reconstruction under varying illumination conditions
This paper addresses the problem of complete and detailed 3D model reconstruction of objects filmed by multiple cameras under varying illumination. Firstly, initial normal maps ar...
Chenglei Wu, Yebin Liu, Xiangyang Ji, Qionghai Dai