Sciweavers

496 search results - page 42 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
CSUR
2004
149views more  CSUR 2004»
13 years 7 months ago
A review of vessel extraction techniques and algorithms
Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put ...
Cemil Kirbas, Francis K. H. Quek
JAISE
2010
169views Algorithms» more  JAISE 2010»
13 years 2 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...
ACMSE
2008
ACM
13 years 10 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
ICPR
2002
IEEE
14 years 9 months ago
Tracking Hands and Objects for an Intelligent Video Production System
We propose a novel method for detecting hands and hand-held objects in desktop manipulation situations. In order to achieve robust tracking under few constraints, we use multiple ...
Motoyuki Ozeki, Masatsugu Itoh, Yuichi Nakamura, Y...
GECCO
2003
Springer
147views Optimization» more  GECCO 2003»
14 years 1 months ago
Developing an Immunity to Spam
Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system ...
Terri Oda, Tony White