Sciweavers

3616 search results - page 687 / 724
» Support Tucker Machines
Sort
View
CCS
2006
ACM
14 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CLEF
2006
Springer
14 years 1 months ago
Medical Image Annotation and Retrieval Using Visual Features
In this article, we present the algorithms and results of our participation in the medical image annotation and retrieval tasks of ImageCLEFmed 2006. We exploit both global featur...
Jing Liu, Yang Hu, Mingjing Li, Songde Ma, Wei-Yin...
FGR
2004
IEEE
167views Biometrics» more  FGR 2004»
14 years 1 months ago
Adaptive Learning of an Accurate Skin-Color Model
Due to variations of lighting conditions, camera hardware settings, and the range of skin coloration among human beings, a pre-defined skin-color model cannot accurately capture t...
Qiang Zhu, Kwang-Ting Cheng, Ching-Tung Wu, Yi-Leh...
EMSOFT
2006
Springer
14 years 1 months ago
Analysis of the zeroconf protocol using UPPAAL
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
ERCIMDL
2006
Springer
204views Education» more  ERCIMDL 2006»
14 years 1 months ago
Comparing and Combining Two Approaches to Automated Subject Classification of Text
A machine-learning and a string-matching approach to automated subject classification of text were compared, as to their performance, advantages and downsides. The former approach ...
Koraljka Golub, Anders Ardö, Dunja Mladenic, ...