Sciweavers

1045 search results - page 34 / 209
» The Use of Exceptions
Sort
View
ICIP
1997
IEEE
15 years 11 months ago
Using mean field annealing to solve anisotropic diffusion problems
Anisotropic diffusion is a powerful method for image feature extraction in which blurring is allowed to occur except at edges. Mean field annealing (MFA) is an image optimization ...
Hairong Qi, Wesley E. Snyder, Griff L. Bilbro
IJCNN
2007
IEEE
15 years 4 months ago
Local Learning of Tide Level Time Series using a Fuzzy Approach
— Forecasting the tide level in the Venezia lagoon is a very compelling task. In this work we propose a new approach to the learning of tide level time series based on the local ...
E. Canestrelli, P. Canestrelli, Marco Corazza, Mau...
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 1 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
AOSE
2006
Springer
15 years 1 months ago
Using Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critic...
Yudistira Asnar, Volha Bryl, Paolo Giorgini
JCS
2006
91views more  JCS 2006»
14 years 9 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...