Sciweavers

1982 search results - page 376 / 397
» New Products
Sort
View
CCS
2006
ACM
15 years 1 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
ITS
2000
Springer
159views Multimedia» more  ITS 2000»
15 years 1 months ago
Can We Learn from ITSs?
With the rise of VR, the internet, and mobile technologies and the shifts in educational focus from teaching to learning and from solitary to collaborative work, it's easy (bu...
Benedict du Boulay
VLDB
2000
ACM
120views Database» more  VLDB 2000»
15 years 1 months ago
Integrating the UB-Tree into a Database System Kernel
Multidimensional access methods have shown high potential for significant performance improvements in various application domains. However, only few approaches have made their way...
Frank Ramsak, Volker Markl, Robert Fenk, Martin Zi...
ICCV
1995
IEEE
15 years 1 months ago
Bayesian Decision Theory, the Maximum Local Mass Estimate, and Color Constancy
Computational vision algorithms are often developed in a Bayesian framework. Two estimators are commonly used: maximum a posteriori (MAP), and minimum mean squared error (MMSE). W...
William T. Freeman, David H. Brainard
KI
1995
Springer
15 years 1 months ago
Integrating Vision and Language: Towards Automatic Description of Human Movements
The integration of vision and natural languageprocessingincreasingly attracts attention in different areas of AI research. Up to now, however, there have only been a few attempts a...
Gerd Herzog, Karl Rohr