Sciweavers

2995 search results - page 270 / 599
» On multi-avoidance of generalized patterns
Sort
View
91
Voted
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
15 years 6 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
IBPRIA
2005
Springer
15 years 6 months ago
Extracting Motion Features for Visual Human Activity Representation
This paper presents a technique to characterize human actions in visual surveillance scenarios in order to describe, in a qualitative way, basic human movements in general imaging ...
Filiberto Pla, Pedro Canotilho Ribeiro, José...
91
Voted
ICAPR
2005
Springer
15 years 6 months ago
Lung Field Segmentation in Digital Postero-Anterior Chest Radiographs
This paper describes a lung field segmentation method, working on digital Postero-Anterior chest radiographs. The lung border is detected by integrating the results obtained by tw...
Paola Campadelli, Elena Casiraghi
117
Voted
ISNN
2005
Springer
15 years 6 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ISVC
2005
Springer
15 years 6 months ago
Efficient Depth Edge Detection Using Structured Light
This research features a novel approach that efficiently detects depth edges in real world scenes. Depth edges play a very important role in many computer vision problems because t...
Jiyoung Park, Cheolhwon Kim, Juneho Yi, Matthew Tu...