Sciweavers

734 search results - page 91 / 147
» Computer Virus Propagation Models
Sort
View
ICPR
2008
IEEE
15 years 4 months ago
Combining shape-from-shading and stereo using Gaussian-Markov random fields
In this paper we present a method of combining stereo and shape-from-shading information, taking account of the local reliability of each shape estimate. Local estimates of dispar...
Tom S. F. Haines, Richard C. Wilson
IPPS
2007
IEEE
15 years 4 months ago
Improved Output Jitter Calculation for Compositional Performance Analysis of Distributed Systems
Compositional performance analysis iteratively alternates local scheduling analysis techniques and output event model propagation between system components to enable performance a...
Rafik Henia, Razvan Racu, Rolf Ernst
ICDCSW
2005
IEEE
15 years 3 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
EMMCVPR
2005
Springer
15 years 3 months ago
Energy Minimization Based Segmentation and Denoising Using a Multilayer Level Set Approach
This paper is devoted to piecewise-constant segmentation of images using a curve evolution approach in a variational formulation. The problem to be solved is also called the minima...
Ginmo Chung, Luminita A. Vese
GG
2008
Springer
14 years 11 months ago
A Decentralized Implementation of Mobile Ambients
We present a graphical implementation for finite processes of the mobile ambients calculus. Our encoding uses unstructured (i.e., non hierarchical) graphs and it is sound and comp...
Fabio Gadducci, Giacoma Valentina Monreale