Sciweavers

13985 search results - page 2617 / 2797
» Active Feature Models
Sort
View
CGF
2008
262views more  CGF 2008»
15 years 3 months ago
Global Correspondence Optimization for Non-Rigid Registration of Depth Scans
We present a registration algorithm for pairs of deforming and partial range scans that addresses the challenges of non-rigid registration within a single non-linear optimization....
Hao Li, Robert W. Sumner, Mark Pauly
144
Voted
CN
2008
126views more  CN 2008»
15 years 3 months ago
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures
Failure resilience is a desired feature of the Internet. Most traditional restoration architectures assume single-failure assumption, which is not adequate in present day WDM opti...
Pallab Datta, Arun K. Somani
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 3 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
143
Voted
CSL
2010
Springer
15 years 3 months ago
Improving supervised learning for meeting summarization using sampling and regression
Meeting summarization provides a concise and informative summary for the lengthy meetings and is an effective tool for efficient information access. In this paper, we focus on ext...
Shasha Xie, Yang Liu
151
Voted
DEBU
2010
205views more  DEBU 2010»
15 years 3 months ago
Spatio-Temporal Stream Processing in Microsoft StreamInsight
Microsoft StreamInsight is a platform for developing and deploying streaming applications. StreamInsight embraces a temporal stream model to unify and further enrich query languag...
Mohamed H. Ali, Badrish Chandramouli, Balan Sethu ...
« Prev « First page 2617 / 2797 Last » Next »