Sciweavers

809 search results - page 97 / 162
» Experiments with Cost-Sensitive Feature Evaluation
Sort
View
ISI
2007
Springer
15 years 3 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CVIU
2004
152views more  CVIU 2004»
15 years 3 months ago
Detecting image orientation based on low-level visual content
Accurately and automatically detecting image orientation is of great importance in intelligent image processing. In this paper, we present automatic image orientation detection al...
Yongmei Michelle Wang, HongJiang Zhang
TMI
1998
91views more  TMI 1998»
15 years 3 months ago
A Vision-Based Technique for Objective Assessment of Burn Scars
—In this paper a method for the objective assessment of burn scars is proposed. The quantitative measures developed in this research provide an objective way to calculate elastic...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar, ...
174
Voted
SP
2002
IEEE
226views Security Privacy» more  SP 2002»
15 years 3 months ago
Dynamic load balancing of SAMR applications on distributed systems
Dynamic load balancing(DLB) for parallel systems has been studied extensively; however, DLB for distributed systems is relatively new. To efficiently utilize computing resources p...
Zhiling Lan, Valerie E. Taylor, Greg Bryan
SMC
2010
IEEE
198views Control Systems» more  SMC 2010»
15 years 2 months ago
Deep web data extraction
—Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web...
Jer Lang Hong