Sciweavers

2236 search results - page 279 / 448
» Intrusion detection techniques and approaches
Sort
View
TVCG
2010
151views more  TVCG 2010»
13 years 9 months ago
Uncertainty-Aware Guided Volume Segmentation
—Although direct volume rendering is established as a powerful tool for the visualization of volumetric data, efficient and reliable feature detection is still an open topic. Us...
Jörg-Stefan Praßni, Timo Ropinski, Klau...
MICCAI
2009
Springer
14 years 8 months ago
Fast Automatic Segmentation of the Esophagus from 3D CT Data Using a Probabilistic Model
Automated segmentation of the esophagus in CT images is of high value to radiologists for oncological examinations of the mediastinum. It can serve as a guideline and prevent confu...
Johannes Feulner, Shaohua Kevin Zhou, Alexander Ca...
SAC
2009
ACM
14 years 5 months ago
Online annotation and prediction for regime switching data streams
Regime switching models, in which the state of the world is locally stationary, are a useful abstraction for many continuous valued data streams. In this paper we develop an onlin...
Gordon J. Ross, Dimitris K. Tasoulis, Niall M. Ada...
ISPEC
2005
Springer
14 years 4 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 4 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...