Sciweavers

27 search results - page 4 / 6
» Fighting Censorship with Algorithms
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 5 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
CAD
2004
Springer
13 years 10 months ago
ESOLID - a system for exact boundary evaluation
We present a system, ESOLID, that performs exact boundary evaluation of low-degree curved solids in reasonable amounts of time. ESOLID performs accurate Boolean operations using e...
John Keyser, Tim Culver, Mark Foskey, Shankar Kris...
CVPR
2007
IEEE
15 years 26 days ago
Groupwise Shape Registration on Raw Edge Sequence via A Spatio-Temporal Generative Model
Groupwise shape registration of raw edge sequence is addressed. Automatically extracted edge maps are treated as noised input shape of the deformable object and their registration...
Huijun Di, Rao Naveed Iqbal, Guangyou Xu, Linmi Ta...
ATAL
2005
Springer
14 years 4 months ago
Automatic computer game balancing: a reinforcement learning approach
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...
DCOSS
2006
Springer
14 years 2 months ago
Roadmap Query for Sensor Network Assisted Navigation in Dynamic Environments
Abstract. Mobile entity navigation in dynamic environments is an essential part of many mission critical applications like search and rescue and fire fighting. The dynamism of the ...
Sangeeta Bhattacharya, Nuzhet Atay, Gazihan Alanku...