Sciweavers

35419 search results - page 7014 / 7084
» How are we doing
Sort
View
134
Voted
ACMSE
2005
ACM
15 years 9 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
140
Voted
APGV
2005
ACM
146views Visualization» more  APGV 2005»
15 years 9 months ago
A similarity-based approach to perceptual feature validation
Which object properties matter most in human perception may well vary according to sensory modality, an important consideration for the design of multimodal interfaces. In this st...
Theresa Cooke, Florian Steinke, Christian Wallrave...
127
Voted
GRAPHITE
2005
ACM
15 years 9 months ago
Uniting cartoon textures with computer assisted animation
We present a novel method to create perpetual animations from a small set of given keyframes. Existing approaches either are limited to re-sequencing large amounts of existing ima...
William Van Haevre, Fabian Di Fiore, Frank Van Ree...
KCAP
2005
ACM
15 years 9 months ago
An instance mapping ontology for the semantic web
Semantic data transformation plays an important role in realizing the vision of the semantic web. It supports the transformation of data in different representations into ontologi...
Yuangui Lei
148
Voted
MM
2005
ACM
215views Multimedia» more  MM 2005»
15 years 9 months ago
OpenVIDIA: parallel GPU computer vision
Graphics and vision are approximate inverses of each other: ordinarily Graphics Processing Units (GPUs) are used to convert “numbers into pictures” (i.e. computer graphics). I...
James Fung, Steve Mann
« Prev « First page 7014 / 7084 Last » Next »