Sciweavers

2391 search results - page 245 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
155
Voted
JSS
2002
198views more  JSS 2002»
15 years 3 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
135
Voted
ICIP
2009
IEEE
15 years 1 months ago
Robust object tracking using correspondence voting for smart surveillance visual sensing nodes
This paper presents a bottom-up tracking algorithm for surveillance applications where speed and reliability in the case of multiple matches and occlusions are major concerns. The...
Mayssaa Al Najjar, Soumik Ghosh, Magdy Bayoumi
110
Voted
3DPVT
2006
IEEE
162views Visualization» more  3DPVT 2006»
15 years 9 months ago
How Far Can We Go with Local Optimization in Real-Time Stereo Matching
Applications such as robot navigation and augmented reality require high-accuracy dense disparity maps in real-time and online. Due to time constraint, most realtime stereo applic...
Liang Wang, Mingwei Gong, Minglun Gong, Ruigang Ya...
227
Voted
WIRN
2005
Springer
15 years 9 months ago
Artificial Immune-Based Optimization Technique for Solving Economic Dispatch in Power System
Abstract. This paper presents an Artificial Immune-based optimization technique for solving the economic dispatch problem in a power system. The main role of electrical power utili...
Titik Khawa Abdul Rahman, Saiful Izwan Suliman, Is...
137
Voted
BMCBI
2008
124views more  BMCBI 2008»
15 years 3 months ago
A probe-treatment-reference (PTR) model for the analysis of oligonucleotide expression microarrays
Background: Microarray pre-processing usually consists of normalization and summarization. Normalization aims to remove non-biological variations across different arrays. The norm...
Huanying Ge, Chao Cheng, Lei M. Li