Sciweavers

1851 search results - page 125 / 371
» Open Source AI
Sort
View
IWIA
2003
IEEE
15 years 10 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 1 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
127
Voted
OSS
2007
Springer
15 years 10 months ago
Using Repository of Repositories (RoRs) to Study the Growth of F/OSS Projects: A Meta-Analysis Research Approach
Free/Open Source Software (F/OSS) repositories contain valuable data and their usefulness in studying software development and community activities continues to attract a lot of re...
Sulayman K. Sowe, Lefteris Angelis, Ioannis Stamel...
CVPR
2009
IEEE
1119views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Adaptive Contour Features in Oriented Granular Space for Human Detection and Segmentation
In this paper, a novel feature named Adaptive Contour Feature (ACF) is proposed for human detection and segmentation. This feature consists of a chain of a number of granules in...
Wei Gao (Tsinghua University), Haizhou Ai (Tsinghu...
CP
1999
Springer
15 years 9 months ago
Search Procedures and Parallelism in Constraint Programming
Abstract. In this paper, we present a major improvement in the search procedures in constraint programming. First, we integrate various search procedures from AI and OR. Second, we...
Laurent Perron