Sciweavers

3819 search results - page 626 / 764
» Predicting Dependability by Testing
Sort
View
RAID
2005
Springer
15 years 9 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
SCIA
2005
Springer
174views Image Analysis» more  SCIA 2005»
15 years 9 months ago
Object Localization with Boosting and Weak Supervision for Generic Object Recognition
Abstract. This paper deals, for the first time, with an analysis of localization capabilities of weakly supervised categorization systems. Most existing categorization approaches ...
Andreas Opelt, Axel Pinz
SAC
2004
ACM
15 years 9 months ago
Guiding motif discovery by iterative pattern refinement
In this paper, we demonstrate that the performance of a motif discovery algorithm can be significantly improved by embedding it into a novel framework that effectively guides the ...
Zhiping Wang, Mehmet M. Dalkilic, Sun Kim
EGPGV
2004
Springer
147views Visualization» more  EGPGV 2004»
15 years 9 months ago
I/O Strategies for Parallel Rendering of Large Time-Varying Volume Data
This paper presents I/O solutions for the visualization of time-varying volume data in a parallel and distributed computing environment. Depending on the number of rendering proce...
Hongfeng Yu, Kwan-Liu Ma, Joel Welling
GD
2004
Springer
15 years 9 months ago
Drawing Power Law Graphs
It has been noted that many realistic graphs have a power law degree distribution and exhibit the small world phenomenon. We present drawing methods influenced by recent developm...
Reid Andersen, Fan R. K. Chung, Lincoln Lu