Sciweavers

1084 search results - page 169 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
14 years 3 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
3DPVT
2006
IEEE
163views Visualization» more  3DPVT 2006»
14 years 3 months ago
Vanishing Hull
Vanishing points are valuable in many vision tasks such as orientation estimation, pose recovery and 3D reconstruction from a single image. Many methods have been proposed to addr...
Jinhui Hu, Suya You, Ulrich Neumann
EUROGRAPHICS
2010
Eurographics
13 years 10 months ago
User Controllable Color Transfer
This paper presents an image editing framework where users use reference images to indicate desired color edits. In our approach, users specify pairs of strokes to indicate corres...
Xiaobo An and Fabio Pellacini
COMCOM
2008
127views more  COMCOM 2008»
13 years 9 months ago
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
The idea of building query-oriented routing indices has changed the way of improving keyword search efficiency from the basis as it can learn the content distribution from the que...
Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Y...
CF
2009
ACM
14 years 3 months ago
Mapping the LU decomposition on a many-core architecture: challenges and solutions
Recently, multi-core architectures with alternative memory subsystem designs have emerged. Instead of using hardwaremanaged cache hierarchies, they employ software-managed embedde...
Ioannis E. Venetis, Guang R. Gao