Sciweavers

6610 search results - page 1239 / 1322
» Community Structures of Networks
Sort
View
109
Voted
BIS
2009
112views Business» more  BIS 2009»
14 years 11 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
EXACT
2009
14 years 11 months ago
Towards the Explanation of Workflows
Across many fields involving complex computing, software systems are being augmented with workflow logging functionality. The log data can be effectively organized using declarativ...
James Michaelis, Li Ding, Deborah L. McGuinness
ICDAR
2009
IEEE
14 years 11 months ago
Towards Handwritten Mathematical Expression Recognition
In this paper, we propose a new framework for online handwritten mathematical expression recognition. The proposed architecture aims at handling mathematical expression recognitio...
Ahmad-Montaser Awal, Harold Mouchère, Chris...
ICDAR
2009
IEEE
14 years 11 months ago
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...
121
Voted
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
14 years 11 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
« Prev « First page 1239 / 1322 Last » Next »