Sciweavers

1205 search results - page 135 / 241
» Comparison of Approaches to Egomotion Computation
Sort
View
TRIDENTCOM
2008
IEEE
15 years 7 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
131
Voted
WACV
2008
IEEE
15 years 7 months ago
Iris Extraction Based on Intensity Gradient and Texture Difference
Biometrics has become more and more important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy. Succ...
Guodong Guo, Michael J. Jones
93
Voted
BMVC
1998
15 years 2 months ago
A Bi-Directional Integrated Model for Non-Rigid Motion Analysis
To be able to understand the motion of deformable objects, techniques in image processing and computer vision are essential for non-rigid motion analysis in this active research a...
Chunyen Liu
114
Voted
ISMB
2000
15 years 2 months ago
Towards a Systematics for Protein Subcellular Location: Quantitative Description of Protein Localization Patterns and Automated
Determination of the functions of all expressed proteins represents one of the major upcoming challenges in computational molecular biology. Since subcellular location plays a cru...
Robert F. Murphy, Michael V. Boland, Meel Velliste
134
Voted
MCS
2011
Springer
14 years 7 months ago
Solving macroeconomic models with "off-the-shelf" software: An example of potential pitfalls
: When working with large-scale models or numerous small models, there can be a temptation to rely on default settings in proprietary software to derive solutions to the model. In ...
Ric D. Herbert, Peter J. Stemp