Sciweavers

2236 search results - page 117 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2009
IEEE
14 years 7 months ago
A multi-modal automatic image registration technique based on complex wavelets
Image registration is considered one of the most fundamental and crucial pre-processing tasks in digital imaging. This paper describes a fast multimodal automatic image registrati...
Milad Ghantous, Soumik Ghosh, Magdy Bayoumi
IUI
2006
ACM
15 years 4 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
SIGCOMM
2004
ACM
15 years 3 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
IEAAIE
1998
Springer
15 years 1 months ago
Applying Computer Vision Techniques to Traffic Monitoring Tasks
This paper presents a method I for tracking and segmenting vehicles in a traffic scene. The approach is based on a frame to frame segmentation followed by a tracking process. As op...
Jorge Badenas, Filiberto Pla
LREC
2008
144views Education» more  LREC 2008»
14 years 11 months ago
Linguistic Resources and Evaluation Techniques for Evaluation of Cross-Document Automatic Content Extraction
The NIST Automatic Content Extraction (ACE) Evaluation expands its focus in 2008 to encompass the challenge of cross-document and cross-language global integration and reconciliat...
Stephanie Strassel, Mark A. Przybocki, Kay Peterso...