Sciweavers

988 search results - page 66 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
ISCAS
2003
IEEE
108views Hardware» more  ISCAS 2003»
15 years 3 months ago
View-dependent transmission of 3-D normal meshes
—A unified approach to rate-distortion (R-D) optimized compression and view-dependent transmission of three-dimensional (3-D) normal meshes is investigated in this work. A norma...
Jae-Young Sim, Chang-Su Kim, C. C. Jay Kuo, Sang U...
AI
2001
Springer
15 years 2 months ago
A Case Study for Learning from Imbalanced Data Sets
We present our experience in applying a rule induction technique to an extremely imbalanced pharmaceutical data set. We focus on using a variety of performance measures to evaluate...
Aijun An, Nick Cercone, Xiangji Huang
3DPVT
2004
IEEE
127views Visualization» more  3DPVT 2004»
15 years 1 months ago
Automatic Extraction of Planar Projections from Panoramic Range Images
This paper presents a segmentation technique to decompose automatically a panoramic range image into a set of planar projections. It consists of three stages. Firstly, two orthogo...
Angel Domingo Sappa
SGP
2004
15 years 7 days ago
Parameterization of Triangle Meshes over Quadrilateral Domains
We present a method for parameterizing irregularly triangulated input models over polyhedral domains with quadrilateral faces. A combination of center-based clustering techniques ...
Ioana M. Boier-Martin, Holly E. Rushmeier, Jingyi ...