Sciweavers

571 search results - page 52 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
149
Voted
DFN
2003
15 years 4 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
124
Voted
CAISE
2006
Springer
15 years 6 months ago
A Tool for Semi-Automated Semantic Schema Mapping: Design and Implementation
Recently, schema mapping has found considerable interest in both research and practice. Determining matching components of database or XML schemas is needed in many applications, e...
Dimitris Manakanatas, Dimitris Plexousakis
ISCAS
2008
IEEE
136views Hardware» more  ISCAS 2008»
15 years 9 months ago
Spatial-temporal consistent labeling for multi-camera multi-object surveillance systems
Abstract—For an intelligent multi-camera multi-object surveillance system, object correspondence across time and space is important to many smart visual applications. In this pap...
Jing-Ying Chang, Tzu-Heng Wang, Shao-Yi Chien, Lia...
107
Voted
ICARIS
2004
Springer
15 years 8 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
110
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Complete and accurate clone detection in graph-based models
Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based develo...
Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, J...