Sciweavers

2615 search results - page 254 / 523
» Analysis of Real Time Operating System Based Applications
Sort
View
ICDM
2007
IEEE
197views Data Mining» more  ICDM 2007»
15 years 10 months ago
Trend Motif: A Graph Mining Approach for Analysis of Dynamic Complex Networks
Complex networks have been used successfully in scientific disciplines ranging from sociology to microbiology to describe systems of interacting units. Until recently, studies of...
Ruoming Jin, Scott McCallen, Eivind Almaas
208
Voted
JMLR
2006
389views more  JMLR 2006»
15 years 3 months ago
A Very Fast Learning Method for Neural Networks Based on Sensitivity Analysis
This paper introduces a learning method for two-layer feedforward neural networks based on sensitivity analysis, which uses a linear training algorithm for each of the two layers....
Enrique Castillo, Bertha Guijarro-Berdiñas,...
121
Voted
CVPR
2007
IEEE
16 years 5 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
119
Voted
VTC
2010
IEEE
107views Communications» more  VTC 2010»
15 years 2 months ago
Contention-Based Neighborhood Estimation
—This paper proposes a probabilistic technique that enables a node to estimate the number of its neighbors that fulfill certain criteria. The technique does not require any a pr...
Helmut Adam, Evsen Yanmaz, Wilfried Elmenreich, Ch...
157
Voted
PR
2010
220views more  PR 2010»
15 years 2 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...