Sciweavers

2414 search results - page 254 / 483
» Computing Normal Subgroups
Sort
View
93
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
ICPR
2000
IEEE
15 years 5 months ago
Comparison between Two Prototype Representation Schemes for a Nearest Neighbor Classifier
2. Character Recognition System The paper is about the problem of finding good prototypes for a condensed nearest neighbor classifiei- in a recognition system. A comparison study ...
Jari Kangas
95
Voted
ICPR
2000
IEEE
15 years 5 months ago
Human Silhouette Recognition with Fourier Descriptors
A novel approach for human silhouette recognition is presented. The method is based on Fourier descriptors. We made an analysis of which and how many descriptors are enough to hav...
Rocío Díaz de León, Luis Enri...
108
Voted
VISUALIZATION
2000
IEEE
15 years 5 months ago
Polyhedral modeling
Polyhedral meshes are used for visualization, computer graphics or geometric modeling purposes and result from many applications like iso-surface extraction, surface reconstructio...
Georges-Pierre Bonneau, Stefanie Hahmann
BPM
2000
Springer
111views Business» more  BPM 2000»
15 years 5 months ago
A Knowledge-Based Approach for Designing Robust Business Processes
This chapter describes a novel knowledge-based methodology and computer toolset for helping business process designers and participants better manage exceptions (unexpected deviati...
Chrysanthos Dellarocas, Mark Klein