Sciweavers

225 search results - page 45 / 45
» A chaincode based scheme for fingerprint feature extraction
Sort
View
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 4 days ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu

Publication
232views
14 years 9 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
ISBI
2006
IEEE
16 years 9 days ago
Automatic landmark tracking applied to optimize brain conformal mapping
Important anatomical features on the cortical surface are usually represented by landmark curves, called sulcal/gyral curves. Manual labeling of these landmark curves is time-cons...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
CVPR
2006
IEEE
15 years 5 months ago
Automatic Landmark Tracking and its Application to the Optimization of Brain Conformal Mapping
Anatomical features on cortical surfaces are usually represented by landmark curves, called sulci/gyri curves. These landmark curves are important information for neuroscientists ...
Lok Ming Lui, Yalin Wang, Tony F. Chan, Paul M. Th...
ACSAC
2003
IEEE
15 years 3 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...