Sciweavers

10995 search results - page 2153 / 2199
» Positioning
Sort
View
TDSC
2010
191views more  TDSC 2010»
13 years 7 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
TJS
2010
182views more  TJS 2010»
13 years 7 months ago
A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning
This paper presents a novel host-based combinatorial method based on k-Means clustering and ID3 decision tree learning algorithms for unsupervised classification of anomalous and ...
Yasser Yasami, Saadat Pour Mozaffari
TMC
2010
138views more  TMC 2010»
13 years 7 months ago
Reliable Anchor-Based Sensor Localization in Irregular Areas
—Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and stora...
Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li
TMI
2010
160views more  TMI 2010»
13 years 7 months ago
Computer-Aided Detection of Polyps in CT Colonography Using Logistic Regression
—We present a computer-aided detection (CAD) system for computed tomography colonography that orders the polyps according to clinical relevance. The CAD system consists of two st...
Vincent Frans van Ravesteijn, Cees van Wijk, Frans...
TVCG
2010
157views more  TVCG 2010»
13 years 7 months ago
Metric-Driven RoSy Field Design and Remeshing
—Designing rotational symmetry fields on surfaces is an important task for a wide range of graphics applications. This work introduces a rigorous and practical approach for auto...
Yu-Kun Lai, Miao Jin, Xuexiang Xie, Ying He 0001, ...
« Prev « First page 2153 / 2199 Last » Next »