Sciweavers

2362 search results - page 368 / 473
» A new approach to edge detection
Sort
View
DSN
2005
IEEE
15 years 7 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
JMLR
2006
147views more  JMLR 2006»
15 years 1 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
TIP
2008
125views more  TIP 2008»
15 years 1 months ago
Segmentation by Fusion of Histogram-Based K-Means Clusters in Different Color Spaces
Abstract--This paper presents a new, simple, and efficient segmentation approach, based on a fusion procedure which aims at combining several segmentation maps associated to simple...
Max Mignotte
GLOBECOM
2010
IEEE
14 years 11 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
ICIP
2010
IEEE
14 years 11 months ago
Robust segmentation of lung tissue in chest CT scanning
This paper deals with segmentation of the lung tissues from low dose CT (LDCT) scans of the chest. Goal is correct segmentation as well as maintaining the details of the lung regi...
Amal A. Farag, James Graham, Aly Farag