Sciweavers

571 search results - page 41 / 115
» Modeling and Analysis of Space Based Transceivers
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ACSAC
2002
IEEE
14 years 1 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
MICCAI
2004
Springer
14 years 9 months ago
Learning Coupled Prior Shape and Appearance Models for Segmentation
We present a novel framework for learning a joint shape and appearance model from a large set of un-labelled training examples in arbitrary positions and orientations. The shape an...
Xiaolei Huang, Zhiguo Li, Dimitris N. Metaxas
PAMI
1998
128views more  PAMI 1998»
13 years 8 months ago
A Hierarchical Latent Variable Model for Data Visualization
—Visualization has proven to be a powerful and widely-applicable tool for the analysis and interpretation of multivariate data. Most visualization algorithms aim to find a projec...
Christopher M. Bishop, Michael E. Tipping
CIS
2005
Springer
14 years 2 months ago
Concept Chain Based Text Clustering
Different from familiar clustering objects, text documents have sparse data spaces. A common way of representing a document is as a bag of its component words, but the semantic re...
Shaoxu Song, Jian Zhang, Chunping Li