Sciweavers

2414 search results - page 323 / 483
» Computing Normal Subgroups
Sort
View
128
Voted
RAID
2009
Springer
15 years 8 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
148
Voted
VRCAI
2009
ACM
15 years 8 months ago
Segmentation of architecture shape information from 3D point cloud
Object Segmentation is an important step in object reconstruction from point cloud data of complex urban scenes and in applications to virtual environment. This paper focuses on s...
Xiaojuan Ning, Xiaopeng Zhang, Yinghui Wang, Marc ...
113
Voted
ACSC
2008
IEEE
15 years 8 months ago
Product flow analysis in distribution networks with a fixed time horizon
The movement of items through a product distribution network is a complex dynamic process which depends not only on the network’s static topology but also on a knowledge of how ...
Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter...
128
Voted
CVPR
2008
IEEE
15 years 8 months ago
3D face tracking and expression inference from a 2D sequence using manifold learning
We propose a person-dependent, manifold-based approach for modeling and tracking rigid and nonrigid 3D facial deformations from a monocular video sequence. The rigid and nonrigid ...
Wei-Kai Liao, Gérard G. Medioni
116
Voted
DSN
2008
IEEE
15 years 8 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang