Sciweavers

686 search results - page 115 / 138
» Automatic Model Generation Strategies for Model Transformati...
Sort
View
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SIAMCOMP
2010
83views more  SIAMCOMP 2010»
14 years 7 months ago
Reaching and Distinguishing States of Distributed Systems
Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each test...
Robert M. Hierons
87
Voted
ICAPR
2009
Springer
15 years 2 months ago
Eigen-domain Relighting of Face Images for Illumination-invariant Face Verification
In this paper, we propose a method to exploit the uniqueness in the illumination variations on the face image of a subject for face verification. Using the 3D wireframe model of a...
Vinod Pathangay, Sukhendu Das
ISBI
2002
IEEE
15 years 10 months ago
Cardiac ultrasound motion detection by elastic registration exploiting temporal coherence
We propose a new global registration method for estimating the cardiac displacement field in 2D sequences of ultrasound images of the heart. The basic idea is to select a referenc...
Andrés Santos, Jan Kybic, Manuel Desco, Mar...
DAS
2010
Springer
15 years 2 months ago
Analysis of whole-book recognition
Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images, attempting to improve accuracy by automatic unsupervised ...
Pingping Xiu, Henry S. Baird