Sciweavers

2236 search results - page 98 / 448
» Intrusion detection techniques and approaches
Sort
View
ICMCS
2010
IEEE
191views Multimedia» more  ICMCS 2010»
14 years 11 months ago
An efficient depth map estimation technique using complex wavelets
A new focus measure system is proposed based on complex wavelet transform and quadrature pair of steerable filters. In shape from focus (SFF), noise, illumination variation and or...
Pankajkumar Mendapara, Aryaz Baradarani, Q. M. Jon...
IAAI
1990
14 years 11 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
IWPC
2009
IEEE
15 years 4 months ago
Standing on the shoulders of giants - A data fusion approach to design pattern detection
Identification of design patterns can deliver important information to designers. Therefore, automated design pattern detection (DPD) is highly desirable when it comes to underst...
Günter Kniesel, Alexander Binun
IWPC
2000
IEEE
15 years 2 months ago
Evaluating the Accessor Classification Approach to Detect Abstract Data Types
ng the Accessor Classification Approach to Detect Abstract Data Types icle presents an approach to identify abstract data types (ADTs) in source code. For each structured type deļ...
Jean-Francois Girard, Martin Würthner
ESANN
2007
14 years 11 months ago
Computational Intelligence approaches to causality detection
Discovering interdependencies and causal relationships is one of the most relevant challenges raised by the information era. As more and better data become available, there is an u...
Katerina Hlavácková-Schindler, Pablo...