Sciweavers

2236 search results - page 140 / 448
» Intrusion detection techniques and approaches
Sort
View
84
Voted
ACSW
2006
14 years 11 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
ICIP
2010
IEEE
14 years 8 months ago
Adaptive blotches detection for film restoration
Blotches are very common, localized, and non persistent impairments in digitized film archive. Many methods have been proposed so far for detecting them and restoring the underlyi...
Antoni Buades, Julie Delon, Yann Gousseau, Simon M...
ICIP
2003
IEEE
15 years 12 months ago
Scene cut detection using the colored pattern appearance model
In this paper, we propose to use the Colored Pattern Appearance Model (CPAM) as a content representation for video scene break detection. This model represents a scene by means of...
Kin-Wai Sze, Kin-Man Lam, Guoping Qiu
AAAI
2007
15 years 20 days ago
Parallel Structured Duplicate Detection
We describe a novel approach to parallelizing graph search using structured duplicate detection. Structured duplicate detection was originally developed as an approach to external...
Rong Zhou, Eric A. Hansen
JAR
2008
81views more  JAR 2008»
14 years 10 months ago
Automatic Symmetry Detection for Promela
We introduce a specification language, Promela-Lite, which captures the essential features of Promela but which, unlike Promela, has a formally defined semantics. We show how we ca...
Alastair F. Donaldson, Alice Miller