Sciweavers

169 search results - page 18 / 34
» Generating Fixes from Object Behavior Anomalies
Sort
View
94
Voted
AAMAS
2006
Springer
14 years 11 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
ICIP
2007
IEEE
15 years 5 months ago
Mean-Shift Blob Tracking with Adaptive Feature Selection and Scale Adaptation
When the appearances of the tracked object and surrounding background change during tracking, fixed feature space tends to cause tracking failure. To address this problem, we prop...
Dawei Liang, Qingming Huang, Shuqiang Jiang, Hongx...
84
Voted
AAAI
2010
15 years 1 months ago
Optimal Strategies for Reviewing Search Results
Web search engines respond to a query by returning more results than can be reasonably reviewed. These results typically include the title, link, and snippet of content from the t...
Jeff Huang, Anna Kazeykina
CGI
2003
IEEE
15 years 5 months ago
Virtualizing Real-World Objects
High quality, virtual 3D models are quickly emerging as a new multimedia data type with applications in such diverse areas as e-commerce, online encyclopaedias, or virtual museums...
Hendrik P. A. Lensch, Jan Kautz, Michael Goesele, ...
COMPSAC
2002
IEEE
15 years 4 months ago
From MSC and UML to SDL
UML and MSC are widely used by software practitioners. SDL is an ITU standard language for telecommunications software specification. It has a formal semantics, and is supported b...
Stephan Bourduas, Ferhat Khendek, Daniel Vincent