Sciweavers

988 search results - page 66 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
ISCAS
2003
IEEE
108views Hardware» more  ISCAS 2003»
14 years 2 months ago
View-dependent transmission of 3-D normal meshes
—A unified approach to rate-distortion (R-D) optimized compression and view-dependent transmission of three-dimensional (3-D) normal meshes is investigated in this work. A norma...
Jae-Young Sim, Chang-Su Kim, C. C. Jay Kuo, Sang U...
AI
2001
Springer
14 years 1 months ago
A Case Study for Learning from Imbalanced Data Sets
We present our experience in applying a rule induction technique to an extremely imbalanced pharmaceutical data set. We focus on using a variety of performance measures to evaluate...
Aijun An, Nick Cercone, Xiangji Huang
3DPVT
2004
IEEE
127views Visualization» more  3DPVT 2004»
14 years 21 days ago
Automatic Extraction of Planar Projections from Panoramic Range Images
This paper presents a segmentation technique to decompose automatically a panoramic range image into a set of planar projections. It consists of three stages. Firstly, two orthogo...
Angel Domingo Sappa
SGP
2004
13 years 11 months ago
Parameterization of Triangle Meshes over Quadrilateral Domains
We present a method for parameterizing irregularly triangulated input models over polyhedral domains with quadrilateral faces. A combination of center-based clustering techniques ...
Ioana M. Boier-Martin, Holly E. Rushmeier, Jingyi ...