Sciweavers

4511 search results - page 630 / 903
» Observation Based System Security
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 5 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
GRAPHICSINTERFACE
2001
15 years 5 months ago
Interacting with Image Sequences: Detail-in-Context and Thumbnails
An image sequence is a series of interrelated images. To enable navigation of large image sequences, many current software packages display small versions of the images, called th...
Oliver Kuederle, Kori Inkpen, M. Stella Atkins, M....
IJCAI
1989
15 years 5 months ago
Filter Preferential Entailment for the Logic of Action in Almost Continuous Worlds
Mechanical systems, of the kinds which are of interest for qualitative reasoning, are characterized by a set of real-valued parameters, each of which is a piecewise continuous fun...
Erik Sandewall
157
Voted
BMCBI
2010
126views more  BMCBI 2010»
15 years 4 months ago
Simulation of a Petri net-based Model of the Terpenoid Biosynthesis Pathway
Background: The development and simulation of dynamic models of terpenoid biosynthesis has yielded a systems perspective that provides new insights into how the structure of this ...
Aliah Hazmah Hawari, Zeti-Azura Mohamed-Hussein
PR
2006
114views more  PR 2006»
15 years 4 months ago
Orientation feature for fingerprint matching
This paper describes a fingerprint verification algorithm based on the orientation field. The orientation field of a fingerprint image has also been used for image alignment. Area...
Jayant V. Kulkarni, Bhushan D. Patil, Raghunath S....