Sciweavers

3898 search results - page 392 / 780
» On the Bit Extraction Problem
Sort
View
ICPR
2008
IEEE
15 years 11 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ICPR
2008
IEEE
15 years 11 months ago
Face recognition using curvelet based PCA
This paper identifies a novel feature space to address the problem of human face recognition from still images. This is based on the PCA space of the features extracted by a new m...
Tanaya Mandal, Q. M. Jonathan Wu
SMI
2008
IEEE
181views Image Analysis» more  SMI 2008»
15 years 11 months ago
Example based skeletonization using harmonic one-forms
This paper presents a method to extract skeletons using examples. Our method is based on the observation that many deformations in real world applications are isometric or near is...
Ying He 0001, Xian Xiao, Hock Soon Seah
AINA
2007
IEEE
15 years 11 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao