Sciweavers

988 search results - page 117 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ATAL
2004
Springer
15 years 3 months ago
A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System
This paper develops and analyzes distributed search techniques for use in a peer-to-peer (P2P) network-based Information Retrieval (IR) system. In the absence of a centralized med...
Haizheng Zhang, W. Bruce Croft, Brian Neil Levine,...
ECCV
2004
Springer
15 years 3 months ago
Segmentation of Abdominal Aortic Aneurysms with a Non-parametric Appearance Model
This paper presents a new method to segment abdominal aortic aneurysms from CT angiography scans. The outer contour of lumen and thrombus are delineated with independent 3D deforma...
Sílvia Delgado Olabarriaga, Marcel Breeuwer...
ACSAC
2003
IEEE
15 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
CVPR
2003
IEEE
15 years 3 months ago
Surface Reconstruction via Helmholtz Reciprocity with a Single Image Pair
This paper brings a novel method for three-dimensional reconstruction of surfaces that takes advantage of the symmetry resulting from alternating the positions of a camera and a l...
Peter H. Tu, Paulo R. S. Mendonça
CHARME
2001
Springer
98views Hardware» more  CHARME 2001»
15 years 2 months ago
Hardware Synthesis Using SAFL and Application to Processor Design
Abstract. We survey the work done so far in the FLaSH project (Functional Languages for Synthesising Hardware) in which the core ideas are (i) using a functional language SAFL to d...
Alan Mycroft, Richard Sharp