Sciweavers

1333 search results - page 199 / 267
» Termination Detection of Local Computations
Sort
View
NDSS
2005
IEEE
14 years 1 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
ECCV
2010
Springer
14 years 1 months ago
Towards Optimal Naive Bayes Nearest Neighbor
Abstract. Naive Bayes Nearest Neighbor (NBNN) is a feature-based image classifier that achieves impressive degree of accuracy [1] by exploiting ‘Image-toClass’ distances and b...
SAC
2003
ACM
14 years 1 months ago
Image Retrieval With Embedded Region Relationships
Image retrieval based on content from digital libraries, multimedia databases, the Internet, and other sources has been an important problem addressed by several researchers. In t...
Sharat Chandran, Naga Kiran
CVPR
2010
IEEE
13 years 9 months ago
Simultaneous Searching of Globally Optimal Interacting Surfaces with Shape Priors
Multiple surface searching with only image intensity information is a difficult job in the presence of high noise and weak edges. We present in this paper a novel method for global...
Qi Song, Xiaodong Wu, Yunlong Liu, Mona Garvin, Mi...
SOCA
2008
IEEE
13 years 7 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart