Sciweavers

796 search results - page 108 / 160
» Spoofing prevention method
Sort
View
MLMI
2005
Springer
14 years 3 months ago
Foreground Regions Extraction and Characterization Towards Real-Time Object Tracking
Abstract. Object localization and tracking are key issues in the analysis of scenes for video surveillance or scene understanding applications. This paper presents a contribution t...
José Luis Landabaso, Montse Pardàs
PET
2005
Springer
14 years 3 months ago
Failures in a Hybrid Content Blocking System
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Richard Clayton
DEXA
2004
Springer
190views Database» more  DEXA 2004»
14 years 3 months ago
On Efficient and Effective Association Rule Mining from XML Data
: In this paper, we propose a framework, called XAR-Miner, for mining ARs from XML documents efficiently and effectively. In XAR-Miner, raw XML data are first transformed to either...
Ji Zhang, Tok Wang Ling, Robert M. Bruckner, A. Mi...
ECOOP
2004
Springer
14 years 3 months ago
Typestates for Objects
Today’s mainstream object-oriented compilers and tools do not support declaring and statically checking simple pre- and postconditions on methods and invariants on object represe...
Robert DeLine, Manuel Fähndrich
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
14 years 3 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf