Sciweavers

456 search results - page 59 / 92
» Enhanced multiple-view feature modelling
Sort
View
77
Voted
IPPS
2005
IEEE
15 years 3 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the diļ¬...
Vasilios A. Siris, Ilias Stavrakis
GMP
2002
IEEE
133views Solid Modeling» more  GMP 2002»
15 years 2 months ago
Non-Manifold Implicit Surfaces Based on Discontinuous Implicitization and Polygonization
Implicit surfaces in 3D geometric modeling are limited to two manifolds because the corresponding implicit fields are usually defined by real-valued functions which bisect space...
Shuntaro Yamazaki, Kiwamu Kase, Katsushi Ikeuchi
ICONIP
2008
14 years 11 months ago
Identifying Emotions Using Topographic Conditioning Maps
Abstract. The amygdala is the neural structure that acts as an evaluator of potentially threatening stimuli. We present a biologically plausible model of the visual fear conditioni...
Athanasios Pavlou, Matthew C. Casey
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
15 years 3 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
CSFW
2011
IEEE
13 years 9 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...