Sciweavers

1325 search results - page 130 / 265
» The Incidence Propagation Method
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ICIP
2000
IEEE
14 years 1 months ago
Switched Error Concealment and Robust Coding Decisions in Scalable Video Coding
This work introduces two complementary techniques to improve the packet loss resilience of scalable video coding systems. First, a “switch per-pixel” error concealment (SPEC) ...
Rui Zhang, Shankar L. Regunathan, Kenneth Rose
ICCV
1999
IEEE
14 years 1 months ago
Learning Low-Level Vision
We describe a learning-based method for low-level vision problems--estimating scenes from images. We generate a synthetic world of scenes and their corresponding rendered images, m...
William T. Freeman, Egon C. Pasztor
RTSS
1994
IEEE
14 years 1 months ago
Guaranteeing End-to-End Timing Constraints by Calibrating Intermediate Processes
This paper presents a comprehensive design methodology for guaranteeing end-to-end requirements of real-time systems. Applications are structured as a set of process components co...
Richard Gerber, Seongsoo Hong, Manas Saksena
MICCAI
2000
Springer
14 years 15 days ago
Robust 3D Segmentation of Anatomical Structures with Level Sets
This paper is focused on the use of the level set formalism to segment anatomical structures in 3D images (ultrasound ou magnetic resonance images). A closed 3D surface propagates...
C. Baillard, Christian Barillot