Sciweavers

8177 search results - page 363 / 1636
» Detecting System Emulators
Sort
View
132
Voted
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
15 years 9 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
CA
2002
IEEE
15 years 8 months ago
Polyhedral Object Detection and Pose Estimation for Augmented Reality Applications
In augmented reality applications, tracking and registration of both cameras and objects is required because, to combine real and rendered scenes, we must project synthetic models...
Ali Shahrokni, Luca Vacchetti, Vincent Lepetit, Pa...
120
Voted
MICCAI
1999
Springer
15 years 8 months ago
Detection of Pulmonary Nodules on Ct and Volumetric Assessment of Change over Time
Abstract. We present a computer vision system that automatically detects pulmonary nodules in computed tomography (CT) scans of oncology patients, performs size analysis and assess...
Margrit Betke, Jane P. Ko
126
Voted
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 8 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
163
Voted
DEBS
2008
ACM
15 years 5 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch