Sciweavers

863 search results - page 150 / 173
» Computational Methods for Intelligent Information Access
Sort
View
SPRINGSIM
2007
15 years 1 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
SPIEVIP
2010
14 years 10 months ago
Ship detection in satellite imagery using rank-order grayscale hit-or-miss transforms
Ship detection from satellite imagery is something that has great utility in various communities. Knowing where ships are and their types provides useful intelligence information....
Neal R. Harvey, Reid B. Porter, James Theiler
IPPS
2009
IEEE
15 years 6 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
IV
2003
IEEE
200views Visualization» more  IV 2003»
15 years 5 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
IPSN
2005
Springer
15 years 5 months ago
Lazy inference on object identities in wireless sensor networks
Tracking the identities of moving objects is an important aspect of most multi-object tracking applications. Uncertainty in sensor data, coupled with the intrinsic difficulty of ...
Jaewon Shin, Nelson Lee, Sebastian Thrun, Leonidas...