Sciweavers

873 search results - page 127 / 175
» step 2005
Sort
View
ISMIS
2005
Springer
15 years 5 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
ISVC
2005
Springer
15 years 5 months ago
Retinal Image Registration for NIH's ETDRS
This paper presents a retinal image registration approach for National Institute of Health (NIH)’s Early Treatment Diabetic Retinopathy Study (ETDRS) standard. The ETDRS imaging ...
Thitiporn Chanwimaluang, Guoliang Fan
ISVC
2005
Springer
15 years 5 months ago
Investigating the Impact of Face Categorization on Recognition Performance
Face recognition is a key biometric technology with a wide range of potential applications both in government and private sectors. Despite considerable progress in face recognition...
Konstantinos Veropoulos, George Bebis, Michael A. ...
ISW
2005
Springer
15 years 5 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
KES
2005
Springer
15 years 5 months ago
Parameter Space Exploration of Agent-Based Models
When developping multi-agent systems (MAS) or models in the context of agent-based simulation (ABS), the tuning of the model constitutes a crucial step of the design process. Indee...
Benoît Calvez, Guillaume Hutzler