Sciweavers

49 search results - page 6 / 10
» Generative models for ticket resolution in expert networks
Sort
View
CCS
2007
ACM
15 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
CVPR
2008
IEEE
16 years 3 days ago
Semantic-based indexing of fetal anatomies from 3-D ultrasound data using global/semi-local context and sequential sampling
The use of 3-D ultrasound data has several advantages over 2-D ultrasound for fetal biometric measurements, such as considerable decrease in the examination time, possibility of p...
Gustavo Carneiro, Fernando Amat, Bogdan Georgescu,...
99
Voted
CCS
2010
ACM
14 years 8 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
FGR
2000
IEEE
147views Biometrics» more  FGR 2000»
15 years 2 months ago
Hallucinating Faces
In this paper, we study face hallucination or synthesizing a high-resolution face image from a low-resolution input, with the help of a large collection of other highresolution fa...
Simon Baker, Takeo Kanade
BMCBI
2007
144views more  BMCBI 2007»
14 years 10 months ago
Accelerated search for biomolecular network models to interpret high-throughput experimental data
Background: The functions of human cells are carried out by biomolecular networks, which include proteins, genes, and regulatory sites within DNA that encode and control protein e...
Suman Datta, Bahrad A. Sokhansanj