Sciweavers

2357 search results - page 323 / 472
» Computing Refactorings of Behavior Models
Sort
View
139
Voted
CVPR
2006
IEEE
16 years 5 months ago
Vessel Crawlers: 3D Physically-based Deformable Organisms for Vasculature Segmentation and Analysis
We present a novel approach to the segmentation and analysis of vasculature from volumetric medical image data. Our method is an adoption and significant extension of deformable o...
Chris McIntosh, Ghassan Hamarneh
CSE
2009
IEEE
15 years 10 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
139
Voted
RAID
2009
Springer
15 years 9 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
111
Voted
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 9 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
IEEESCC
2010
IEEE
15 years 5 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel