Sciweavers

882 search results - page 121 / 177
» Analysis of Composite Corridors
Sort
View
RAID
2007
Springer
15 years 6 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
CICLING
2005
Springer
15 years 5 months ago
A Computational Model of the Spanish Clitic System
In this paper a computational model of the Spanish clitic system is presented. In this model clitic pronouns receive a dual analysis in which enclitics are considered inflexions wh...
Luis Alberto Pineda, Ivan V. Meza
LSSC
2005
Springer
15 years 5 months ago
A Multiscale Discontinuous Galerkin Method
We propose a new class of Discontinuous Galerkin (DG) methods based on variational multiscale ideas. Our approach begins with an additive decomposition of the discontinuous finite...
Pavel B. Bochev, Thomas J. R. Hughes, Guglielmo Sc...
ICDAR
2003
IEEE
15 years 5 months ago
Document page similarity based on layout visual saliency: Application to query by example and document classification
In this paper we propose to define a measure of visual similarity to compare different pages in a corpus. This measure is based on the analysis of the visual layout saliency of th...
Véronique Eglin, Stéphane Bres
CORR
2010
Springer
213views Education» more  CORR 2010»
14 years 12 months ago
Morphological study of Albanian words, and processing with NooJ
We are developing electronic dictionaries and transducers for the automatic processing of the Albanian Language. We will analyze the words inside a linear segment of text. We will...
Odile Piton, Klara Lagji