Sciweavers

2236 search results - page 367 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Diffusion on Statistical Manifolds
This paper presents a new diffusion scheme on statistical manifolds for the detection of texture boundaries. The technique derives from our previous work, in which 2-dimensional R...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...
MICCAI
2009
Springer
14 years 10 months ago
A Fast Alternative to Computational Fluid Dynamics for High Quality Imaging of Blood Flow
Obtaining detailed, patient-specific blood flow information would be very useful in detecting and monitoring cardio-vascular diseases. Current approaches rely on computational flui...
Robert H. P. McGregor, Dominik Szczerba, Krishnamu...
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 9 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng
SIGMOD
2005
ACM
212views Database» more  SIGMOD 2005»
14 years 9 months ago
A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification
Data integrated from multiple sources may contain inconsistencies that violate integrity constraints. The constraint repair problem attempts to find "low cost" changes t...
Philip Bohannon, Michael Flaster, Wenfei Fan, Raje...
EUROGRAPHICS
2010
Eurographics
14 years 6 months ago
Uncertain 2D Vector Field Topology
We introduce an approach to visualize stationary 2D vector fields with global uncertainty obtained by considering the transport of local uncertainty in the flow. For this, we ex...
Mathias Otto, Tobias Germer, Hans-Christian Hege, ...