Sciweavers

1508 search results - page 241 / 302
» A Toolbox of Level Set Methods
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
ICALT
2005
IEEE
15 years 3 months ago
Predicting Students' Marks in Hellenic Open University
The ability to provide assistance for a student at the appropriate level is invaluable in the learning process. Not only does it aid the student’s learning process but also prev...
Sotiris B. Kotsiantis, Panayiotis E. Pintelas
ICCV
2005
IEEE
15 years 3 months ago
Phase Field Models and Higher-Order Active Contours
The representation and modelling of regions is an important topic in computer vision. In this paper, we represent a region via a level set of a ‘phase field’ function. The fu...
Marie Rochery, Ian Jermyn, Josiane Zerubia
ICMCS
2005
IEEE
139views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Rapid Feature Space Speaker Adaptation for Multi-Stream HMM-Based Audio-Visual Speech Recognition
Multi-stream hidden Markov models (HMMs) have recently been very successful in audio-visual speech recognition, where the audio and visual streams are fused at the final decision...
Jing Huang, Etienne Marcheret, Karthik Visweswaria...
ICSM
2005
IEEE
15 years 3 months ago
Contract-Based Mutation for Testing Components
Testing plays an important role in the maintenance of Component Based Software Development. Test adequacy for component testing is one of the hardest issues for component testing....
Ying Jiang, Shan-Shan Hou, Jinhui Shan, Lu Zhang, ...