Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Flexibility and adaptability are essential properties of intelligent manufacturing systems. However, it is a major challenge to realize these properties and the benefits of a flexi...
Lars Kock Jensen, Yves Demazeau, Bent Bruun Kriste...
: Many model management tasks, e.g., schema matching or merging, require the manual handling of metadata. Given the diversity of metadata, its many different representations and mo...
Woven fabrics have a wide range of appearance determined by their small-scale 3D structure. Accurately modeling this structural detail can produce highly realistic renderings of f...
Shuang Zhao, Wenzel Jakob, Steve Marschner, Kavita...
We present an approach to low-level vision that combines two main ideas: the use of convolutional networks as an image processing architecture and an unsupervised learning procedu...