Sciweavers

8575 search results - page 1324 / 1715
» A Model of Learning Using the Internet
Sort
View
MCS
2007
Springer
15 years 11 months ago
Group-Induced Vector Spaces
The strength of classifier combination lies either in a suitable averaging over multiple experts/sources or in a beneficial integration of complementary approaches. In this paper...
Manuele Bicego, Elzbieta Pekalska, Robert P. W. Du...
ICCV
2005
IEEE
15 years 10 months ago
A Study of Detecting Social Interaction with Sensors in a Nursing Home Environment
Social interaction plays an important role in our daily lives. It is one of the most important indicators of physical or mental diseases of aging patients. In this paper, we presen...
Datong Chen, Jie Yang, Howard D. Wactlar
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CP
2004
Springer
15 years 10 months ago
Understanding Random SAT: Beyond the Clauses-to-Variables Ratio
It is well known that the ratio of the number of clauses to the number of variables in a random k-SAT instance is highly correlated with the instance’s empirical hardness. We con...
Eugene Nudelman, Kevin Leyton-Brown, Holger H. Hoo...
CODES
1999
IEEE
15 years 9 months ago
An MPEG-2 decoder case study as a driver for a system level design methodology
We present a case study on the design of a heterogeneous architecture for MPEG-2 video decoding. The primary objective of the case study is the validation of the SPADE methodology...
Pieter van der Wolf, Paul Lieverse, Mudit Goel, Da...
« Prev « First page 1324 / 1715 Last » Next »