Sciweavers

2362 search results - page 238 / 473
» A new approach to edge detection
Sort
View
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 5 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
EVOW
2008
Springer
15 years 3 months ago
Detection of Quantitative Trait Associated Genes Using Cluster Analysis
Abstract. Many efforts have been involved in association study of quantitative phenotypes and expressed genes. The key issue is how to efficiently identify phenotype-associated gen...
Zhenyu Jia, Sha Tang, Dan Mercola, Shizhong Xu
102
Voted
TSP
2008
86views more  TSP 2008»
15 years 1 months ago
Fixed-Complexity Soft MIMO Detection via Partial Marginalization
Abstract--This paper presents a new approach to soft demodulation for MIMO channels. The proposed method is an approximation to the exact a posteriori probability-per-bit computer....
Erik G. Larsson, Joakim Jalden
CGF
2008
125views more  CGF 2008»
15 years 1 months ago
Sparse points matching by combining 3D mesh saliency with statistical descriptors
This paper proposes new methodology for the detection and matching of salient points over several views of an object. The process is composed by three main phases. In the first st...
Umberto Castellani, Marco Cristani, Simone Fantoni...