Sciweavers

1757 search results - page 192 / 352
» Alternating Refinement Relations
Sort
View
120
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
ICALP
1998
Springer
15 years 7 months ago
A Neuroidal Architecture for Cognitive Computation
An architecture is described for designing systems that acquire and manipulate large amounts of unsystematized, or so-called commonsense, knowledge. Its aim is to exploit to the fu...
Leslie G. Valiant
129
Voted
PODS
1995
ACM
120views Database» more  PODS 1995»
15 years 7 months ago
Applying an Update Method to a Set of Receivers
d abstract Marc Andries, Leiden University Luca Cabibbo, University of Romey Jan Paredaens, University of Antwerpz Jan Van den Bussche, INRIAx In the context of object databases...
Marc Andries, Luca Cabibbo, Jan Paredaens, Jan Van...
208
Voted
BMVC
2001
15 years 6 months ago
Combining 3D Deformable Models and Level Set Methods for the Segmentation of Abdominal Aortic Aneurysms
In this paper we present a system that combines the benefits of 3D deformable models and level set methods for medical volume segmentation. Our 3D deformable model is a very comp...
Derek R. Magee, Andrew J. Bulpitt, Elizabeth Berry
110
Voted
AAAI
2007
15 years 6 months ago
Computational Aspects of Covering in Dominance Graphs
Various problems in AI and multiagent systems can be tackled by finding the “most desirable” elements of a set given some binary relation. Examples can be found in areas as d...
Felix Brandt, Felix A. Fischer