Sciweavers

350 search results - page 41 / 70
» A Component-Labeling Algorithm Using Contour Tracing Techniq...
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 11 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
DEXA
2008
Springer
137views Database» more  DEXA 2008»
15 years 6 months ago
A Grid-Based Multi-relational Approach to Process Mining
Abstract. Industrial, scientific, and commercial applications use information systems to trace the execution of a business process. Relevant events are registered in massive logs a...
Antonio Turi, Annalisa Appice, Michelangelo Ceci, ...
LCTRTS
2010
Springer
15 years 11 months ago
Sampling-based program execution monitoring
For its high overall cost during product development, program debugging is an important aspect of system development. Debugging is a hard and complex activity, especially in time-...
Sebastian Fischmeister, Yanmeng Ba
CGI
2001
IEEE
15 years 8 months ago
Hardware-Accelerated Rendering of Antialiased Shadows with Shadow Maps
We present a hardware-accelerated method for rendering high quality, antialiased shadows using the shadow map approach. Instead of relying on dedicated hardware support for shadow...
Stefan Brabec, Hans-Peter Seidel
DAGSTUHL
1997
15 years 5 months ago
Ray-Based Data Level Comparisons of Direct Volume Rendering Algorithms
This paper describes and demonstrates the e ectiveness of several metrics for data level comparison of direct volume rendering (DVR) algorithms. The focus is not on speed ups from...
Kwansik Kim, Alex Pang