Sciweavers

6660 search results - page 1205 / 1332
» Data Analysis for Query Processing
Sort
View
DAC
2010
ACM
15 years 6 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
204
Voted
MICCAI
2000
Springer
15 years 6 months ago
Robust 3D Segmentation of Anatomical Structures with Level Sets
This paper is focused on the use of the level set formalism to segment anatomical structures in 3D images (ultrasound ou magnetic resonance images). A closed 3D surface propagates...
C. Baillard, Christian Barillot
151
Voted
SSD
1995
Springer
146views Database» more  SSD 1995»
15 years 6 months ago
Discovery of Spatial Association Rules in Geographic Information Databases
Spatial data mining, i.e., discovery of interesting, implicit knowledge in spatial databases, is an important task for understanding and use of spatial data- and knowledge-bases. I...
Krzysztof Koperski, Jiawei Han
164
Voted
WSC
2007
15 years 5 months ago
Simulation tool for manpower forecast loading and resource leveling
Large scale / mega projects are lengthy complex endeavors that require significant planning by management, engineers and construction personnel to ensure the success of the projec...
Mikhail Hanna, Janaka Y. Ruwanpura
162
Voted
CIA
2008
Springer
15 years 4 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
« Prev « First page 1205 / 1332 Last » Next »