Sciweavers

3674 search results - page 642 / 735
» Information Dependencies
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
15 years 2 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
DICTA
2003
15 years 2 months ago
Extracting Boundaries from Images by Comparing Cooccurrence Matrices
Abstract. This paper describes methods of extracting region boundaries from the frames of an image sequence by combining information from spatial or temporal cooccurrence matrices ...
Astrit Rexhepi, Azriel Rosenfeld
FIW
2003
120views Communications» more  FIW 2003»
15 years 2 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
WSCG
2004
143views more  WSCG 2004»
15 years 2 months ago
Palmprint Verification with Moments
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure bet...
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Che...
COLING
1992
15 years 2 months ago
Generating Coherent Argumentative Paragraphs
Q Should I take AI this semester? We address the problem of generating a coherent A If you want to take courses likeparagraph presenting arguments for a conclusion in a Natural La...
Michael Elhadad