Sciweavers

1748 search results - page 171 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
ECCV
2008
Springer
16 years 5 months ago
Analysis of Building Textures for Reconstructing Partially Occluded Facades
Abstract. As part of an architectural modeling project, this paper investigates the problem of understanding and manipulating images of buildings. Our primary motivation is to auto...
Thommen Korah, Christopher Rasmussen
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 3 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
WWW
2007
ACM
16 years 4 months ago
Why we search: visualizing and predicting user behavior
The aggregation and comparison of behavioral patterns on the WWW represent a tremendous opportunity for understanding past behaviors and predicting future behaviors. In this paper...
Eytan Adar, Daniel S. Weld, Brian N. Bershad, Stev...
SERSCISA
2009
Springer
15 years 10 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 9 months ago
Test quality analysis and improvement for an embedded asynchronous FIFO
Embedded First-In First-Out (FIFO) memories are increasingly used in many IC designs. We have created a new full-custom embedded FIFO module with asynchronous read and write clock...
Tobias Dubois, Erik Jan Marinissen, Mohamed Aziman...