Sciweavers

13 search results - page 2 / 3
» Vertical and Horizontal Percentage Aggregations
Sort
View
ISBI
2002
IEEE
14 years 6 months ago
Automatic segmentation of mammographic masses using fuzzy shadow and maximum-likelihood analysis
This study attempted to accurately segment tumors in mammograms. Although this task is considered to be a preprocessing step in a computer analysis program, it plays an important ...
Lisa Kinnard, Shih-Chung Ben Lo, Paul C. Wang, Mat...
IM
2003
13 years 6 months ago
Hierarchical End-to-End Service Recovery
: Failed networks, for example MPLS, can cause signaling storms the size of which can grow dramatically with network size. This paper presents a new scalable fault notification pro...
Mohamed El-Darieby, Dorina C. Petriu, Jerry Rolia
VIZSEC
2005
Springer
13 years 11 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
ICDT
2010
ACM
194views Database» more  ICDT 2010»
13 years 7 months ago
Bag Equivalence of XPath Queries
When a query is evaluated under bag semantics, each answer is returned as many times as it has derivations. Bag semantics has long been recognized as important, especially when ag...
Sara Cohen, Yaacov Y. Weiss
DBSEC
2008
365views Database» more  DBSEC 2008»
13 years 6 months ago
Secure Construction of Contingency Tables from Distributed Data
Abstract. Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ...
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. A...