Sciweavers

2236 search results - page 412 / 448
» Intrusion detection techniques and approaches
Sort
View
PVLDB
2010
93views more  PVLDB 2010»
13 years 6 months ago
Distributed Threshold Querying of General Functions by a Difference of Monotonic Representation
The goal of a threshold query is to detect all objects whose score exceeds a given threshold. This type of query is used in many settings, such as data mining, event triggering, a...
Guy Sagy, Daniel Keren, Izchak Sharfman, Assaf Sch...
SIAMSC
2010
153views more  SIAMSC 2010»
13 years 6 months ago
Asymptotic Imaging of Perfectly Conducting Cracks
In this paper, we consider cracks with Dirichlet boundary conditions. We first derive an asymptotic expansion of the boundary perturbations that are due to the presence of a smal...
Habib Ammari, Hyeonbae Kang, Hyundae Lee, Won-Kwan...
WS
2010
ACM
13 years 6 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
ICCAD
2010
IEEE
121views Hardware» more  ICCAD 2010»
13 years 5 months ago
Multi-Wafer Virtual Probe: Minimum-cost variation characterization by exploring wafer-to-wafer correlation
In this paper, we propose a new technique, referred to as MultiWafer Virtual Probe (MVP) to efficiently model wafer-level spatial variations for nanoscale integrated circuits. Tow...
Wangyang Zhang, Xin Li, Emrah Acar, Frank Liu, Rob...
ICIP
2010
IEEE
13 years 5 months ago
Rapid stereo-vision enhanced face recognition
This paper presents a real-time face recognition system. The system uses a stereo camera to locate, track, and recognize a person's face. Our algorithm improves state-of-the-...
Sergey Kosov, Thorsten Thormählen, Hans-Peter...