Sciweavers

10988 search results - page 1935 / 2198
» Algorithmic Folding Complexity
Sort
View
IJCAI
2003
15 years 5 months ago
Generalizing GraphPlan by Formulating Planning as a CSP
We examine the approach of encoding planning problems as CSPs more closely. First we present a simple CSP encoding for planning problems and then a set of transformations that can...
Adriana Lopez, Fahiem Bacchus
VMV
2001
248views Visualization» more  VMV 2001»
15 years 5 months ago
Using an Extended Hough Transform Combined with a Kalman Filter to Segment Tubular Structures in 3D Medical Images
We present a new approach for the coarse segmentation of tubular structures in 3D image data. Our algorithm, which requires only few initial values and minimal user interaction, c...
Thorsten Behrens, Karl Rohr, H. Siegfried Stiehl
SSWMC
2004
15 years 5 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
IKE
2003
15 years 5 months ago
A Tree-Based inverted File for Fast Ranked-Document Retrieval
Inverted files are widely used to index documents in large-scale information retrieval systems. An inverted file consists of posting lists, which can be stored in either a documen...
Wann-Yun Shieh, Tien-Fu Chen, Chung-Ping Chung
IM
2003
15 years 5 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
« Prev « First page 1935 / 2198 Last » Next »