Sciweavers

6087 search results - page 1028 / 1218
» Knowledge discovery methods
Sort
View
171
Voted
ICCV
1999
IEEE
15 years 9 months ago
Multi-Frame Optical Flow Estimation using Subspace Constraints
We show that the set of all ow- elds in a sequence of frames imaging a rigid scene resides in a lowdimensional linear subspace. Based on this observation, we develop a method for ...
Michal Irani
LICS
1999
IEEE
15 years 9 months ago
First-Order Logic vs. Fixed-Point Logic in Finite Set Theory
The ordered conjecture states that least fixed-point logic LFP is strictly more expressive than first-order logic FO on every infinite class of ordered finite structures. It has b...
Albert Atserias, Phokion G. Kolaitis
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 9 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
WCRE
1999
IEEE
15 years 9 months ago
Recovering Code to Documentation Links in OO Systems
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual pages...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
ACSAC
1998
IEEE
15 years 9 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
« Prev « First page 1028 / 1218 Last » Next »