Sciweavers

5856 search results - page 441 / 1172
» Developing Query Patterns
Sort
View
IEEEIAS
2007
IEEE
15 years 11 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
INFOCOM
2007
IEEE
15 years 11 months ago
Oblivious Routing with Mobile Fusion Centers over a Sensor Network
— We consider the problem of aggregating data at a mobile fusion center (fusor) (eg. a PDA or a cellular phone) moving within a spatial region over which a wireless sensor networ...
Devavrat Shah, Sanjay Shakkottai
SAC
2006
ACM
15 years 10 months ago
Digital geometry image analysis for medical diagnosis
This paper describes a new medical image analysis technique for polygon mesh surfaces of human faces for a medical diagnosis application. The goal is to explore the natural patter...
Jiandong Fang, Shiaofen Fang, Jeffrey Huang, Mihra...
SIGGRAPH
1997
ACM
15 years 9 months ago
A model of visual masking for computer graphics
In this paper we develop a computational model of visual masking based on psychophysical data. The model predicts how the presence of one visual pattern affects the detectability...
James A. Ferwerda, Peter Shirley, Sumanta N. Patta...
FINTAL
2006
15 years 8 months ago
Morphological Lexicon Extraction from Raw Text Data
The tool extract enables the automatic extraction of lemma-paradigm pairs from raw text data. The tool uses search patterns that consist of regular expressions and propositional lo...
Markus Forsberg, Harald Hammarström, Aarne Ra...