Sciweavers

15351 search results - page 493 / 3071
» The information bottleneck method
Sort
View
MMMACNS
2005
Springer
15 years 10 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
DSMML
2004
Springer
15 years 9 months ago
Extensions of the Informative Vector Machine
The informative vector machine (IVM) is a practical method for Gaussian process regression and classification. The IVM produces a sparse approximation to a Gaussian process by com...
Neil D. Lawrence, John C. Platt, Michael I. Jordan
ISI
2004
Springer
15 years 9 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
IEEEMSP
2002
IEEE
181views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
Combining stereo and visual hull information for on-line reconstruction and rendering of dynamic scenes
—In this paper, we present a novel system which combines depth-from-stereo and visual hull reconstruction for acquiring dynamic real-world scenes at interactive rates. First, we ...
Hartmut Schirmacher, Ming Li, Marcus A. Magnor, Ha...
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 9 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike