Sciweavers

686 search results - page 115 / 138
» Automatic Model Generation Strategies for Model Transformati...
Sort
View
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SIAMCOMP
2010
83views more  SIAMCOMP 2010»
15 years 1 months ago
Reaching and Distinguishing States of Distributed Systems
Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each test...
Robert M. Hierons
ICAPR
2009
Springer
15 years 7 months ago
Eigen-domain Relighting of Face Images for Illumination-invariant Face Verification
In this paper, we propose a method to exploit the uniqueness in the illumination variations on the face image of a subject for face verification. Using the 3D wireframe model of a...
Vinod Pathangay, Sukhendu Das
ISBI
2002
IEEE
16 years 3 months ago
Cardiac ultrasound motion detection by elastic registration exploiting temporal coherence
We propose a new global registration method for estimating the cardiac displacement field in 2D sequences of ultrasound images of the heart. The basic idea is to select a referenc...
Andrés Santos, Jan Kybic, Manuel Desco, Mar...
125
Voted
DAS
2010
Springer
15 years 7 months ago
Analysis of whole-book recognition
Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images, attempting to improve accuracy by automatic unsupervised ...
Pingping Xiu, Henry S. Baird