Sciweavers

962 search results - page 118 / 193
» Some Reducibilities on Regular Sets
Sort
View
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
TVCG
2012
195views Hardware» more  TVCG 2012»
12 years 16 days ago
Hierarchical Streamline Bundles
—Effective three-dimensional streamline placement and visualization plays an essential role in many science and engineering disciplines. The main challenge for effective streamli...
Hongfeng Yu, Chaoli Wang, Ching-Kuang Shene, Jacqu...
ILP
2003
Springer
14 years 3 months ago
Disjunctive Learning with a Soft-Clustering Method
In the case of concept learning from positive and negative examples, it is rarely possible to find a unique discriminating conjunctive rule; in most cases, a disjunctive descripti...
Guillaume Cleuziou, Lionel Martin, Christel Vrain
CVPR
2010
IEEE
14 years 6 months ago
Warping Background Subtraction
We present a background model that differentiates between background motion and foreground objects. Unlike most models that represent the variability of pixel intensity at a partic...
Teresa Ko, Stefano Soatto, Deborah Estrin
QI
2009
Springer
190views Physics» more  QI 2009»
14 years 4 months ago
Characterizing Pure High-Order Entanglements in Lexical Semantic Spaces via Information Geometry
An emerging topic in Quantuam Interaction is the use of lexical semantic spaces, as Hilbert spaces, to capture the meaning of words. There has been some initial evidence that the p...
Yuexian Hou, Dawei Song