Sciweavers

380 search results - page 43 / 76
» Time Capsule Signature
Sort
View
CVPR
2009
IEEE
14 years 11 days ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
ACSAC
2004
IEEE
14 years 7 days ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
ER
2008
Springer
179views Database» more  ER 2008»
13 years 10 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen
IADIS
2008
13 years 10 months ago
Subspace Orthogonal Projection for Texture Segmentation with Wavelet Frames
We propose a new supervised texture segmentation and classification technique based on combining features extracted from the discrete wavelet frames of an image (specifically, the...
Mahmoud K. Quweider
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov