Sciweavers

2801 search results - page 55 / 561
» On the Adequateness of the Connection Method
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
SIAMIS
2010
147views more  SIAMIS 2010»
13 years 7 months ago
Augmented Lagrangian Method, Dual Methods, and Split Bregman Iteration for ROF, Vectorial TV, and High Order Models
In image processing, the Rudin-Osher-Fatemi (ROF) model [L. Rudin, S. Osher, and E. Fatemi, Physica D, 60(1992), pp. 259–268] based on total variation (TV) minimization has prove...
Chunlin Wu, Xue-Cheng Tai
SSIAI
2002
IEEE
14 years 1 months ago
Automatic Referencing of Multi-Spectral Images
In order to adequately process satellite and radar information, it is necessary to find the exact correspondence between different types of images and between these images and th...
Roberto Araiza, Hongjie Xie, Scott A. Starks, Vlad...
TLCA
2001
Springer
14 years 1 months ago
Subtyping Recursive Games
Using methods drawn from Game Semantics, we build a sound and computationally adequate model of a simple calculus that includes both subtyping and recursive types. Our model solves...
Juliusz Chroboczek
TON
2010
122views more  TON 2010»
13 years 7 months ago
The (in)completeness of the observed internet AS-level structure
— Despite significant efforts to obtain an accurate picture of the Internet’s connectivity structure at the level of individual autonomous systems (ASes), much has remained un...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...