Sciweavers

456 search results - page 59 / 92
» Enhanced multiple-view feature modelling
Sort
View
IPPS
2005
IEEE
15 years 9 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the diļ¬...
Vasilios A. Siris, Ilias Stavrakis
GMP
2002
IEEE
133views Solid Modeling» more  GMP 2002»
15 years 9 months ago
Non-Manifold Implicit Surfaces Based on Discontinuous Implicitization and Polygonization
Implicit surfaces in 3D geometric modeling are limited to two manifolds because the corresponding implicit fields are usually defined by real-valued functions which bisect space...
Shuntaro Yamazaki, Kiwamu Kase, Katsushi Ikeuchi
113
Voted
ICONIP
2008
15 years 5 months ago
Identifying Emotions Using Topographic Conditioning Maps
Abstract. The amygdala is the neural structure that acts as an evaluator of potentially threatening stimuli. We present a biologically plausible model of the visual fear conditioni...
Athanasios Pavlou, Matthew C. Casey
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
15 years 9 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
CSFW
2011
IEEE
14 years 3 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...