Sciweavers

2236 search results - page 302 / 448
» Intrusion detection techniques and approaches
Sort
View
ICPR
2004
IEEE
14 years 11 months ago
Localization of Saliency through Iterative Voting
Saliency is an important perceptual cue that occurs at different scales of resolution. Important attributes of saliency are symmetry, continuity, and closure. Detection of these a...
Bahram Parvin, Mary Helen Barcellos-Hoff, Qing Yan...
ICIP
2009
IEEE
14 years 11 months ago
A Variational Framework For 3d Colonic Polyp Visualization In Virtual Colonoscopy
Colorectal cancer includes cancer of the colon, rectum, anus and appendix. Since it is largely preventable, it is extremely important to detect and treat the colorectal cancer in ...
IPOM
2009
Springer
14 years 5 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
ICDM
2007
IEEE
196views Data Mining» more  ICDM 2007»
14 years 4 months ago
Diagnosing Similarity of Oscillation Trends in Time Series
Sensor networks have increased the amount and variety of temporal data available, requiring the definition of new techniques for data mining. Related research typically addresses...
Leonardo E. Mariote, Claudia Bauzer Medeiros, Rica...
BIOSURVEILLANCE
2007
Springer
14 years 4 months ago
High Performance Computing for Disease Surveillance
Abstract. The global health, threatened by emerging infectious diseases, pandemic influenza, and biological warfare, is becoming increasingly dependent on the rapid acquisition, p...
David W. Bauer, Brandon W. Higgs, Mojdeh Mohtashem...