Sciweavers

3791 search results - page 480 / 759
» Packing sets of patterns
Sort
View
134
Voted
AGILE
2009
Springer
264views GIS» more  AGILE 2009»
15 years 11 months ago
Three-Valued 9-Intersection for Deriving Possible Topological Relations from Incomplete Observations
Topological relations, which concern how two objects intersect, are one of the most fundamental and well-studied spatial relations. Typically, topological relations are distinguis...
Yohei Kurata
141
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 11 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
RAID
2009
Springer
15 years 11 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
CEC
2008
IEEE
15 years 11 months ago
Distributed multi-relational data mining based on genetic algorithm
—An efficient algorithm for mining important association rule from multi-relational database using distributed mining ideas. Most existing data mining approaches look for rules i...
Wenxiang Dou, Jinglu Hu, Kotaro Hirasawa, Gengfeng...
CVPR
2008
IEEE
15 years 11 months ago
A robust descriptor based on Weber's Law
Inspired by Weber's Law, this paper proposes a simple, yet very powerful and robust local descriptor, Weber Local Descriptor (WLD). It is based on the fact that human percept...
Jie Chen, Shiguang Shan, Guoying Zhao, Xilin Chen,...