Sciweavers

670 search results - page 94 / 134
» Inclusion-Based Approximate Reasoning
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
ACIVS
2009
Springer
14 years 2 months ago
Behavioral State Detection of Newborns Based on Facial Expression Analysis
Abstract. Prematurely born infants are observed at a Neonatal Intensive Care Unit (NICU) for medical treatment. Whereas vital body functions are continuously monitored, their incub...
Lykele Hazelhoff, Jungong Han, Sidarto Bambang-Oet...
ICFEM
2009
Springer
14 years 2 months ago
Circular Coinduction with Special Contexts
Coinductive proofs of behavioral equivalence often require human ingenuity, in that one is expected to provide a “good” relation extending one’s goal with additional lemmas, ...
Dorel Lucanu, Grigore Rosu
SCALESPACE
2009
Springer
14 years 2 months ago
Line Enhancement and Completion via Linear Left Invariant Scale Spaces on SE(2)
From an image we construct an invertible orientation score, which provides an overview of local orientations in an image. This orientation score is a function on the group SE(2) of...
Remco Duits, Erik Franken
APLAS
2009
ACM
14 years 2 months ago
Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation
We present a simple algorithmic extension of the classical call-strings approach to mitigate substantial performance degradation caused by spurious interprocedural cycles. Spuriou...
Hakjoo Oh