Sciweavers

1801 search results - page 60 / 361
» Pointing without a pointer
Sort
View
ACSAC
2004
IEEE
14 years 26 days ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
HIPC
2000
Springer
14 years 21 days ago
Improving Offset Assignment on Embedded Processors Using Transformations
Embedded systems consisting of the application program ROM, RAM, the embedded processor core and any custom hardware on a single wafer are becoming increasingly common in areas suc...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir
TMI
2010
134views more  TMI 2010»
13 years 3 months ago
Mitral Annulus Segmentation From 3D Ultrasound Using Graph Cuts
The shape of the mitral valve annulus is used in diagnostic and modeling applications, yet methods to accurately and reproducibly delineate the annulus are limited. This paper pres...
Robert Schneider, Douglas P. Perrin, Nikolay V. Va...
GRAPHITE
2003
ACM
14 years 2 months ago
Point-based modelling and rendering using radial basis functions
A point-based 3D surface modelling technique combined with a new point rendering technique is presented. Surfaces are modelled by specifying a set of unorganized points on the sur...
Patrick Reuter, Ireneusz Tobor, Christophe Schlick...
VMCAI
2010
Springer
14 years 6 months ago
Shape Analysis with Reference Set Relations
Tracking subset relations between the contents containers on the heap is fundamental to modeling the semantics of many common programing idioms such as applying a function to a sub...
Mark Marron, Rupak Majumdar, Darko Stefanovic, Dee...