Sciweavers

6318 search results - page 1234 / 1264
» Data Leakage Detection
Sort
View
AAAI
2006
14 years 11 months ago
Salience in Orientation-Filter Response Measured as Suspicious Coincidence in Natural Images
Visual cortex neurons have receptive fields resembling oriented bandpass filters, and their response distributions on natural images are non-Gaussian. Inspired by this, we previou...
Subramonia Sarma, Yoonsuck Choe
ACL
2006
14 years 11 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...
ECIS
2003
14 years 11 months ago
Emerging organisations: metateams in major IT projects
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
Walter D. Fernández, Alan Underwood
AAAI
2000
14 years 11 months ago
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...
WSCG
2003
167views more  WSCG 2003»
14 years 11 months ago
Vector-valued Image Restoration with Applications to Magnetic Resonance Velocity Imaging
The analysis of blood flow patterns and the interaction between salient topological flow features and cardiovascular structure plays an important role in the study of cardiovascul...
Yin-Heung Pauline Ng, Guang-Zhong Yang
« Prev « First page 1234 / 1264 Last » Next »