Sciweavers

2236 search results - page 391 / 448
» Intrusion detection techniques and approaches
Sort
View
ISMAR
2007
IEEE
14 years 3 months ago
A Method for Predicting Marker Tracking Error
Many Augmented Reality (AR) applications use marker-based vision tracking systems to recover camera pose by detecting one or more planar landmarks. However, most of these systems ...
Russell M. Freeman, Simon J. Juliet, Anthony Steed
PG
2007
IEEE
14 years 3 months ago
Lighting Details Preserving Photon Density Estimation
Standard density estimation approaches suffer from visible bias due to low-pass filtering of the lighting function. Therefore, most photon density estimation methods have been us...
Robert Herzog, Hans-Peter Seidel
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 3 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
CP
2007
Springer
14 years 3 months ago
Exploiting Past and Future: Pruning by Inconsistent Partial State Dominance
It has recently been shown, for the Constraint Satisfaction Problem (CSP), that the state associated with a node of the search tree built by a backtracking algorithm can be exploit...
Christophe Lecoutre, Lakhdar Sais, Sébastie...
OTM
2007
Springer
14 years 3 months ago
An Outlook on Semantic Business Process Mining and Monitoring
Semantic Business Process Management (SBPM) has been proposed as an extension of BPM with Semantic Web and Semantic Web Services (SWS) technologies in order to increase and enhance...
Ana Karla Alves de Medeiros, Carlos Pedrinaci, Wil...