Sciweavers

253 search results - page 44 / 51
» Two-step Lax-Friedrichs method
Sort
View
COMCOM
2006
88views more  COMCOM 2006»
13 years 7 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
CVPR
2006
IEEE
14 years 9 months ago
Simultaneous Registration and Modeling of Deformable Shapes
Many natural objects vary the shapes as linear combinations of certain bases. The measurement of such deformable shapes is coupling of rigid similarity transformations between the...
Jing Xiao, Bogdan Georgescu, Xiang Zhou, Dorin Com...
CIKM
2009
Springer
14 years 2 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang
ECBS
2006
IEEE
158views Hardware» more  ECBS 2006»
14 years 1 months ago
Automated Translation of C/C++ Models into a Synchronous Formalism
For complex systems that are reusing intellectual property components, functional and compositional design correctness are an important part of the design process. Common system l...
Hamoudi Kalla, Jean-Pierre Talpin, David Berner, L...
DAS
2010
Springer
13 years 10 months ago
Handwritten Arabic text line segmentation using affinity propagation
In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps Coarse text ...
Jayant Kumar, Wael Abd-Almageed, Le Kang, David S....