Sciweavers

1702 search results - page 300 / 341
» Hidden Pattern Statistics
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 4 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
MM
2006
ACM
189views Multimedia» more  MM 2006»
15 years 3 months ago
Real-time computerized annotation of pictures
Automated annotation of digital pictures has been a highly challenging problem for computer scientists since the invention of computers. The capability of annotating pictures by c...
Jia Li, James Ze Wang
AMFG
2005
IEEE
203views Biometrics» more  AMFG 2005»
15 years 3 months ago
Learning to Fuse 3D+2D Based Face Recognition at Both Feature and Decision Levels
2D intensity images and 3D shape models are both useful for face recognition, but in different ways. While algorithms have long been developed using 2D or 3D data, recently has see...
Stan Z. Li, ChunShui Zhao, Meng Ao, Zhen Lei
APGV
2004
ACM
176views Visualization» more  APGV 2004»
15 years 3 months ago
Towards perceptually realistic talking heads: models, methods and McGurk
Motivated by the need for an informative, unbiased and quantitative perceptual method for the development and evaluation of a talking head we are developing, we propose a new test...
Darren Cosker, Susan Paddock, A. David Marshall, P...
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee