Sciweavers

1767 search results - page 259 / 354
» Open Source Ecology
Sort
View
ECCV
2010
Springer
15 years 9 months ago
Word Spotting in the Wild
We present a method for spotting words in the wild, i.e., in real images taken in unconstrained environments. Text found in the wild has a surprising range of difficulty. At one en...
EUROSEC
2010
ACM
15 years 9 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
CSMR
2003
IEEE
15 years 9 months ago
Moving to Smaller Libraries via Clustering and Genetic Algorithms
There may be several reasons to reduce a software system to its bare bone removing the extra fat introduced during development or evolution. Porting the software system on embedde...
Giuliano Antoniol, Massimiliano Di Penta, Markus N...
DISCEX
2003
IEEE
15 years 9 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
HPDC
2003
IEEE
15 years 9 months ago
Policies for Swapping MPI Processes
Despite the enormous amount of research and development work in the area of parallel computing, it is a common observation that simultaneous performance and ease-of-use are elusiv...
Otto Sievert, Henri Casanova