Sciweavers

2236 search results - page 366 / 448
» Intrusion detection techniques and approaches
Sort
View
ASPLOS
2010
ACM
15 years 1 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...
BMCBI
2010
129views more  BMCBI 2010»
14 years 10 months ago
A temporal precedence based clustering method for gene expression microarray data
Background: Time-course microarray experiments can produce useful data which can help in understanding the underlying dynamics of the system. Clustering is an important stage in m...
Ritesh Krishna, Chang-Tsun Li, Vicky Buchanan-Woll...
CVPR
2009
IEEE
16 years 5 months ago
Automatic Reconstruction of Cities from Remote Sensor Data
In this paper, we address the complex problem of rapid modeling of large-scale areas and present a novel approach for the automatic reconstruction of cities from remote sensor da...
Charalambos Poullis (CGIT/IMSC/USC), Suya You (Uni...
CVPR
1999
IEEE
16 years 1 days ago
Deformable Template and Distribution Mixture-Based Data Modeling for the Endocardial Contour Tracking in an Echographic Sequence
We1 present a new method to shape-based segmentation of deformable anatomical structures in medical images and validate this approach by detecting and tracking the endocardial bor...
Max Mignotte, Jean Meunier
ECCV
2000
Springer
15 years 12 months ago
Divergence-Based Medial Surfaces
The medial surface of a volumetric object is of significant interest for shape analysis. However, its numerical computation can be subtle. Methods based on Voronoi techniques prese...
Sylvain Bouix, Kaleem Siddiqi