Sciweavers

872 search results - page 74 / 175
» Score Processing For MIR
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICPR
2010
IEEE
15 years 5 months ago
Fusion of Qualities for Frame Selection in Video Face Verification
It is known that the use of video can help improve the performance of face verification systems. However, processing video in resource constrained devices is prohibitive. In order ...
Mauricio Villegas, Roberto Paredes
124
Voted
TREC
2001
15 years 4 months ago
CL Research Experiments in TREC-10 Question Answering
CL Research's question-answering system (DIMAP-QA) for TREC-10 only slightly extends its semantic relation triple (logical form) technology in which documents are fully parse...
Kenneth C. Litkowski
VIP
2003
15 years 4 months ago
On the Structural Algorithm of Filtering Graphs for Layout
When the amount of information in visualization becomes large enough, users can not perceive all elements at the same time. This problem can be solved by removing parts of the inf...
Xiaodi Huang, Wei Lai
127
Voted
TREC
1996
15 years 4 months ago
ANU/ACSys TREC-5 Experiments
A number of experiments conducted within the framework of the TREC-5 conference and using the Parallel Document Retrieval Engine (PADRE) are reported. Several of the experiments i...
David Hawking, Paul B. Thistlewaite, Peter Bailey