Sciweavers

225 search results - page 45 / 45
» A chaincode based scheme for fingerprint feature extraction
Sort
View
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 5 months ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu

Publication
232views
13 years 3 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
ISBI
2006
IEEE
14 years 5 months ago
Automatic landmark tracking applied to optimize brain conformal mapping
Important anatomical features on the cortical surface are usually represented by landmark curves, called sulcal/gyral curves. Manual labeling of these landmark curves is time-cons...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
CVPR
2006
IEEE
13 years 10 months ago
Automatic Landmark Tracking and its Application to the Optimization of Brain Conformal Mapping
Anatomical features on cortical surfaces are usually represented by landmark curves, called sulci/gyri curves. These landmark curves are important information for neuroscientists ...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
ACSAC
2003
IEEE
13 years 8 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...