Sciweavers

1805 search results - page 328 / 361
» Computationally Efficient Face Detection
Sort
View
RAID
1999
Springer
15 years 3 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
WICOMM
2008
258views more  WICOMM 2008»
14 years 10 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
BMVC
2010
14 years 9 months ago
Background Modelling on Tensor Field for Foreground Segmentation
The paper proposes a new method to perform foreground detection by means of background modeling using the tensor concept. Sometimes, statistical modelling directly on image values...
Rui Caseiro, Jorge Batista, Pedro Martins
CONEXT
2009
ACM
15 years 3 days ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
BMCBI
2010
156views more  BMCBI 2010»
14 years 11 months ago
Evaluation of statistical methods for normalization and differential expression in mRNA-Seq experiments
Background: High-throughput sequencing technologies, such as the Illumina Genome Analyzer, are powerful new tools for investigating a wide range of biological and medical question...
James H. Bullard, Elizabeth Purdom, Kasper D. Hans...