Sciweavers

1508 search results - page 272 / 302
» A Toolbox of Level Set Methods
Sort
View
IRI
2003
IEEE
15 years 3 months ago
Damage Pattern Mining in Hurricane Image Databases
– We present a damage pattern mining framework for hurricane data on residential houses using aerial photographs with 1:3000 based scale. The vertical photographs are normally co...
Shu-Ching Chen, Mei-Ling Shyu, Chengcui Zhang, Wal...
SIGIR
2000
ACM
15 years 2 months ago
Evaluating evaluation measure stability
: This paper presents a novel way of examining the accuracy of the evaluation measures commonly used in information retrieval experiments. It validates several of the rules-of-thum...
Chris Buckley, Ellen M. Voorhees
RTSS
1998
IEEE
15 years 2 months ago
Improved Response-Time Analysis Calculations
Schedulability analysis of fixed priority preemptive scheduled systems can be performed by calculating the worst-case response-time of the involved processes. The system is deemed...
Mikael Sjödin, Hans Hansson
CIKM
2006
Springer
15 years 1 months ago
Structure-based querying of proteins using wavelets
The ability to retrieve molecules based on structural similarity has use in many applications, from disease diagnosis and treatment to drug discovery and design. In this paper, we...
Keith Marsolo, Srinivasan Parthasarathy, Kotagiri ...
FM
2006
Springer
146views Formal Methods» more  FM 2006»
15 years 1 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler