Sciweavers

5990 search results - page 816 / 1198
» The Sampling Analysis Pattern
Sort
View
PET
2009
Springer
15 years 9 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
112
Voted
AINA
2008
IEEE
15 years 9 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
116
Voted
CEC
2008
IEEE
15 years 9 months ago
Mesh dependency of stress-based crossover for structural topology optimization
— This paper presents a genetic algorithm (GA) with a stress-based crossover (SX) operator to obtain a solution without checkerboard patterns for multi-constrained topology optim...
Cuimin Li, Tomoyuki Hiroyasu, Mitsunori Miki
ICPR
2008
IEEE
15 years 8 months ago
3D face recognition with the average-half-face
We present a promising analysis on using the pattern of symmetry in the face to increase the accuracy of three-dimensional face recognition. We introduce the concept of the ‘ave...
Josh Harguess, Shalini Gupta, Jake K. Aggarwal
ICPR
2008
IEEE
15 years 8 months ago
Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT
Lymphangioleiomyomatosis (LAM) is a multisystem disorder associated with proliferation of smooth muscle-like cells, which leads to destruction of lung parenchyma. Subjective gradi...
Jianhua Yao, Nilo Avila, Andrew Dwyer, Angelo M. T...