Sciweavers

799 search results - page 38 / 160
» Visualization of clone detection results
Sort
View
OTM
2007
Springer
14 years 3 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
CVPR
2011
IEEE
13 years 5 months ago
What Makes a Chair a Chair?
Many object classes are primarily defined by their functions. However, this fact has been left largely unexploited by visual object categorization or detection systems. We propos...
Helmut Grabner, Juergen Gall, Luc VanGool
GLOBECOM
2009
IEEE
14 years 22 days ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
GI
2003
Springer
14 years 2 months ago
Visualization of cross sectional data for morphogenetic studies
Abstract: We report on a visualization system that has been implemented to study cellular events which regulate morphogenesis of large organs or whole embryos. For data acquisition...
Guido Brunnett, Marek Vanco, Christine Haller, S. ...
ICCV
2001
IEEE
14 years 10 months ago
Computing Visual Correspondence with Occlusions via Graph Cuts
Several new algorithms for visual correspondence based on graph cuts [6, 13, 16] have recently been developed. While these methods give very strong results in practice, they do no...
Vladimir Kolmogorov, Ramin Zabih