Sciweavers

1929 search results - page 161 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
FLAIRS
2010
15 years 6 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
171
Voted
FGR
2008
IEEE
202views Biometrics» more  FGR 2008»
15 years 4 months ago
Illumination transfer using homomorphic wavelet filtering and its application to light-insensitive face recognition
In this paper, we propose a novel homomorphic wavelet filtering based illumination transfer technique to change the dominant lighting of one face image (source face image) to anot...
Hu Han, Shiguang Shan, Xilin Chen, Wen Gao
QOFIS
2004
Springer
15 years 9 months ago
Provider-Level Service Agreements for Inter-domain QoS Delivery
In the current Internet, business relationships and agreements between peered ISPs do not usually make specific guarantees on reachability, availability or network performance. How...
Panos Georgatsos, Jason Spencer, David Griffin, Ta...
JCDL
2009
ACM
133views Education» more  JCDL 2009»
15 years 10 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
CORR
2004
Springer
87views Education» more  CORR 2004»
15 years 4 months ago
Roles Are Really Great!
We present a new role system for specifying changing referencing relationships of heap objects. The role of an object depends, in large part, on its aliasing relationships with ot...
Viktor Kuncak, Patrick Lam, Martin C. Rinard