Sciweavers

2270 search results - page 136 / 454
» The Quality of Knowledge: Knowledge Patterns and Knowledge R...
Sort
View
CVPR
2009
IEEE
15 years 4 months ago
Image Deblurring for Less Intrusive Iris Capture
For most iris capturing scenarios, captured iris images could easily blur when the user is out of the depth of field (DOF) of the camera, or when he or she is moving. The common...
Xinyu Huang (University of Kentucky), Liu Ren (Rob...
SAC
2004
ACM
14 years 3 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 1 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
MICCAI
2000
Springer
14 years 1 months ago
Fusing Speed and Phase Information for Vascular Segmentation in Phase Contrast MR Angiograms
This paper presents a statistical approach to aggregating speed and phase (directional) information for vascular segmentation in phase contrast magnetic resonance angiograms (PC-MR...
Albert C. S. Chung, J. Alison Noble, Paul E. Summe...
AIPS
2008
13 years 12 months ago
Planning for Modular Printers: Beyond Productivity
This paper reports our experience extending an on-line printer controller based on AI planning to handle two significant features of this commercially important domain: execution ...
Minh Binh Do, Wheeler Ruml, Rong Zhou