Sciweavers

796 search results - page 108 / 160
» Spoofing prevention method
Sort
View
MLMI
2005
Springer
15 years 10 months ago
Foreground Regions Extraction and Characterization Towards Real-Time Object Tracking
Abstract. Object localization and tracking are key issues in the analysis of scenes for video surveillance or scene understanding applications. This paper presents a contribution t...
José Luis Landabaso, Montse Pardàs
PET
2005
Springer
15 years 10 months ago
Failures in a Hybrid Content Blocking System
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Richard Clayton
DEXA
2004
Springer
190views Database» more  DEXA 2004»
15 years 10 months ago
On Efficient and Effective Association Rule Mining from XML Data
: In this paper, we propose a framework, called XAR-Miner, for mining ARs from XML documents efficiently and effectively. In XAR-Miner, raw XML data are first transformed to either...
Ji Zhang, Tok Wang Ling, Robert M. Bruckner, A. Mi...
ECOOP
2004
Springer
15 years 10 months ago
Typestates for Objects
Today’s mainstream object-oriented compilers and tools do not support declaring and statically checking simple pre- and postconditions on methods and invariants on object represe...
Robert DeLine, Manuel Fähndrich
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
15 years 10 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf