Sciweavers

6329 search results - page 1160 / 1266
» Detection of Stochastic Processes
Sort
View
145
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 5 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
140
Voted
IJWIS
2008
107views more  IJWIS 2008»
15 years 4 months ago
Adaptive ontology re-use: finding and re-using sub-ontologies
Purpose The discovery of the "right" ontology or ontology part is a central ingredient for effective ontology re-use. We present an approach for supporting a form of ada...
Rodolfo Stecher, Claudia Niederée, Wolfgang...
148
Voted
IJCV
2006
117views more  IJCV 2006»
15 years 4 months ago
Programmable Imaging: Towards a Flexible Camera
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric an...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
IJES
2006
99views more  IJES 2006»
15 years 4 months ago
Dynamic reconfiguration for management of radiation-induced faults in FPGAs
This paper describes novel methods of exploiting the partial, dynamic reconfiguration capabilities of Xilinx Virtex V1000 FPGAs to manage single-event upset (SEU) faults due to rad...
Maya Gokhale, Paul Graham, Michael J. Wirthlin, Da...
IS
2006
15 years 4 months ago
A methodology for clustering XML documents by structure
The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations ...
Theodore Dalamagas, Tao Cheng, Klaas-Jan Winkel, T...
« Prev « First page 1160 / 1266 Last » Next »