Sciweavers

753 search results - page 87 / 151
» Completing a (k - 1)-Assignment
Sort
View
ICEIS
2008
IEEE
15 years 4 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
ICIP
2008
IEEE
15 years 4 months ago
Automatic lattice detection in near-regular histology array images
Near-regular texture (NRT), denoting deviations from otherwise symmetric wallpaper patterns, is commonly observable in the real world. Existing lattice detection algorithms captur...
Brian A. Canada, Georgia K. Thomas, Keith C. Cheng...
ICPP
2008
IEEE
15 years 4 months ago
Parallel Inferencing for OWL Knowledge Bases
Abstract— We examine the problem of parallelizing the inferencing process for OWL knowledge-bases. A key challenge in this problem is partitioning the computational workload of t...
Ramakrishna Soma, Viktor K. Prasanna
MIAR
2008
IEEE
15 years 4 months ago
Amygdala Surface Modeling with Weighted Spherical Harmonics
Abstract. Although there are numerous publications on amygdala volumetry, so far there has not been many studies on modeling local amygdala surface shape variations in a rigorous f...
Moo K. Chung, Brendon M. Nacewicz, Shubing Wang, K...
VR
2008
IEEE
228views Virtual Reality» more  VR 2008»
15 years 4 months ago
Creating a Speech Enabled Avatar from a Single Photograph
This paper presents a complete framework for creating a speechenabled avatar from a single image of a person. Our approach uses a generic facial motion model which represents defo...
Dmitri Bitouk, Shree K. Nayar