Sciweavers

332 search results - page 50 / 67
» Using transformations to improve semantic matching
Sort
View
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CVPR
2010
IEEE
15 years 8 months ago
Two Perceptually Motivated Strategies for Shape Classification
In this paper, we propose two new, perceptually motivated strategies to better measure the similarity of 2D shape instances that are in the form of closed contours. The first strat...
Andrew Temlyakov, Brent C. Munsell, Jarrell W. Wag...
IJIS
2007
93views more  IJIS 2007»
14 years 11 months ago
Perspectives on ontology-based querying
In this paper, we introduce principles for ontology-based querying of information bases. We consider a framework in which a basis ontology over atomic concepts in combination with ...
Rasmus Knappe, Henrik Bulskov, Troels Andreasen
ICISP
2010
Springer
15 years 1 months ago
Selecting Optimal Orientations of Gabor Wavelet Filters for Facial Image Analysis
Abstract. Gabor wavelet-based methods have been widely used to extract representative features for face analysis. However, the existing methods usually suffer from high computation...
Tianqi Zhang, Bao-Liang Lu
ECCV
2002
Springer
16 years 1 months ago
Multi-scale EM-ICP: A Fast and Robust Approach for Surface Registration
We investigate in this article the rigid registration of large sets of points, generally sampled from surfaces. We formulate this problem as a general Maximum-Likelihood (ML) estim...
Sébastien Granger, Xavier Pennec