Sciweavers

1281 search results - page 219 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
ICASSP
2010
IEEE
15 years 2 months ago
Leveraging evaluation metric-related training criteria for speech summarization
Many of the existing machine-learning approaches to speech summarization cast important sentence selection as a two-class classification problem and have shown empirical success f...
Shih-Hsiang Lin, Yu-Mei Chang, Jia-Wen Liu, Berlin...
122
Voted
CAD
2006
Springer
15 years 2 months ago
Repairing CAD model errors based on the design history
For users of CAD data, few things are as frustrating as receiving unusable, poor quality data. Users often waste time fixing or rebuilding such data from scratch on the basis of p...
Jeongsam Yang, Soonhung Han
IJMMS
2008
119views more  IJMMS 2008»
15 years 1 months ago
Collaboration and co-ordination in mature eXtreme programming teams
Mature eXtreme programming (XP) teams are highly collaborative and self-organising. In previous studies, we have observed that these teams rely on two apparently simple mechanisms...
Helen Sharp, Hugh Robinson
SOPR
1998
117views more  SOPR 1998»
15 years 1 months ago
Software processes: a retrospective and a path to the future
Software engineering focuses on producing quality software products through quality processes. The attention to processes dates back to the early 70’s, when software engineers r...
Gianpaolo Cugola, Carlo Ghezzi
MICCAI
2003
Springer
16 years 2 months ago
Cortical Shift Tracking Using a Laser Range Scanner and Deformable Registration Methods
A novel brain shift tracking protocol is introduced in this paper which utilizes laser range scan (LRS) data and 2D deformable image registration. This protocol builds on previous ...
Tuhin K. Sinha, Valerie Duay, Benoit M. Dawant, Mi...