Sciweavers

988 search results - page 89 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
IJCAI
1989
14 years 11 months ago
Negative Reasoning Using Inheritance
This paper presents methods of default reasoning which allow us to draw negative conclusions that are not available in some of the models for inheritance reasoning. Some of these ...
Lin Padgham
AVSS
2009
IEEE
14 years 11 months ago
Robust Vehicle Detection for Tracking in Highway Surveillance Videos Using Unsupervised Learning
This paper presents a novel approach to vehicle detection in highway surveillance videos. This method incorporates well-studied computer vision and machine learning techniques to ...
Birgi Tamersoy, Jake K. Aggarwal
BMCBI
2007
63views more  BMCBI 2007»
14 years 10 months ago
Prediction of the burial status of transmembrane residues of helical membrane proteins
Background: Helical membrane proteins (HMPs) play a crucial role in diverse cellular processes, yet it still remains extremely difficult to determine their structures by experimen...
Yungki Park, Sikander Hayat, Volkhard Helms
IJISEC
2008
101views more  IJISEC 2008»
14 years 10 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
ISI
2008
Springer
14 years 10 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen