Sciweavers

117 search results - page 22 / 24
» Identifying Intrusions in Computer Networks with Principal C...
Sort
View
POLICY
2004
Springer
14 years 4 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
AC
2003
Springer
14 years 2 months ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
IRI
2007
IEEE
14 years 5 months ago
A Reference Framework for Requirements and Architecture in Biomedical Grid Systems
In this paper we introduce the work done to define a framework for requirements and architectural understanding in biomedical grid computing systems. A set of core requirements fo...
Chris Mattmann, Vito Perrone, Sean C. Kelly, Danie...
ICA
2010
Springer
13 years 12 months ago
Use of Prior Knowledge in a Non-Gaussian Method for Learning Linear Structural Equation Models
Abstract. We discuss causal structure learning based on linear structural equation models. Conventional learning methods most often assume Gaussianity and create many indistinguish...
Takanori Inazumi, Shohei Shimizu, Takashi Washio
GIS
2007
ACM
14 years 11 months ago
Evacuation route planning: scalable heuristics
Given a transportation network, a vulnerable population, and a set of destinations, evacuation route planning identifies routes to minimize the time to evacuate the vulnerable pop...
Sangho Kim, Betsy George, Shashi Shekhar