Sciweavers

2236 search results - page 291 / 448
» Intrusion detection techniques and approaches
Sort
View
GCB
2003
Springer
82views Biometrics» more  GCB 2003»
14 years 3 months ago
Threshold extraction in metabolite concentration data
The further development of analytical techniques based on gas chromatography and mass spectrometry now facilitate the generation of larger sets of metabolite concentration data. T...
André Flöter, Jacques Nicolas, Torsten...
CVPR
2007
IEEE
15 years 17 days ago
Learning Features for Tracking
We treat tracking as a matching problem of detected keypoints between successive frames. The novelty of this paper is to learn classifier-based keypoint descriptions allowing to i...
Michael Grabner, Helmut Grabner, Horst Bischof
ICSM
2008
IEEE
14 years 5 months ago
Supporting software evolution analysis with historical dependencies and defect information
More than 90% of the cost of software is due to maintenance and evolution. Understanding the evolution of large software systems is a complex problem, which requires the use of va...
Marco D'Ambros
PAKDD
2004
ACM
137views Data Mining» more  PAKDD 2004»
14 years 3 months ago
Fast and Light Boosting for Adaptive Mining of Data Streams
Supporting continuous mining queries on data streams requires algorithms that (i) are fast, (ii) make light demands on memory resources, and (iii) are easily to adapt to concept dr...
Fang Chu, Carlo Zaniolo
IJCSS
2006
111views more  IJCSS 2006»
13 years 10 months ago
An Algorithm for Accurate Measurement of Corneal Thickness Using Ultrasound RF Signal
A faster and more accurate method for the detection of corneal thickness using an ultrasonic pulse-echo technique was proposed. The corneal thickness was calculated from the time ...
P. J. Cao, K. Kirk Shung