Sciweavers

1829 search results - page 36 / 366
» aims 2008
Sort
View
COMCOM
2002
143views more  COMCOM 2002»
14 years 9 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
SIAMAM
2002
122views more  SIAMAM 2002»
14 years 9 months ago
A Level Set Method for Anisotropic Geometric Diffusion in 3D Image Processing
A new morphological multiscale method in 3D image processing is presented which combines the image processing methodology based on nonlinear diffusion equations and the theory of g...
Martin Rumpf, Tobias Preußer
TSMC
1998
132views more  TSMC 1998»
14 years 9 months ago
Decision support for vehicle dispatching using genetic programming
—Vehicle dispatching consists of allocating real-time service requests to a fleet of moving vehicles. In this paper, each vehicle is associated with a vector of attribute values...
Ilham Benyahia, Jean-Yves Potvin
TCS
2002
14 years 9 months ago
A characterization of c.e. random reals
A real is computably enumerable if it is the limit of a computable, increasing, converging sequence of rationals. A real is random if its binary expansion is a random sequence. Ou...
Cristian Calude
TIT
2002
96views more  TIT 2002»
14 years 9 months ago
An axiomatization of partition entropy
Abstract-- The aim of this paper is to present an axiomatization of a generalization of Shannon's entropy starting from partitions of finite sets. The proposed axiomatization ...
Dan A. Simovici, Szymon Jaroszewicz