Sciweavers

76 search results - page 13 / 16
» A Framework to Detect Deviations During Process Enactment
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 10 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
80
Voted
DIMVA
2008
14 years 11 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
84
Voted
BMVC
2010
14 years 8 months ago
Implicit Shape Kernel for Discriminative Learning of the Hough Transform Detector
The Hough transform provides an efficient way to detect objects. Various methods have been proposed to achieve discriminative learning of the Hough transform, but they have usuall...
Yimeng Zhang, Tsuhan Chen
84
Voted
IPMI
2007
Springer
15 years 11 months ago
Learning Best Features and Deformation Statistics for Hierarchical Registration of MR Brain Images
A fully learning-based framework has been presented for deformable registration of MR brain images. In this framework, the entire brain is first adaptively partitioned into a numbe...
Guorong Wu, Feihu Qi, Dinggang Shen
72
Voted
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...