Sciweavers

9133 search results - page 1782 / 1827
» Modelling perception using image processing algorithms
Sort
View
IFIP
2004
Springer
15 years 7 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
IMR
2004
Springer
15 years 7 months ago
Entkerner: A System for Removal of Globally Invisible Triangles from Large Meshes
We present a method that computes a global potentially visible set for the complete region outside the convex hull of an object. The technique is used to remove invisible parts (t...
Manfred Ernst, Frank Firsching, Roberto Grosso
SAINT
2003
IEEE
15 years 7 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
WEBDB
2010
Springer
143views Database» more  WEBDB 2010»
15 years 7 months ago
Querying Wikipedia Documents and Relationships
Wikipedia has become an important source of information which is growing very rapidly. However, the existing infrastructure for querying this information is limited and often igno...
Huong Nguyen, Thanh Nguyen, Hoa Nguyen, Juliana Fr...
HAPTICS
2002
IEEE
15 years 7 months ago
Computationally Efficient Techniques for Real Time Surgical Simulation with Force Feedback
In this paper, we present computationally efficient algorithms for the real time simulation of minimally invasive surgical (MIS) procedures. To develop a surgical simulator for tr...
Jung Kim, Suvranu De, Mandayam A. Srinivasan
« Prev « First page 1782 / 1827 Last » Next »