Sciweavers

5866 search results - page 1106 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
ISCAS
2005
IEEE
141views Hardware» more  ISCAS 2005»
15 years 3 months ago
Image compression using texture modeling
Abstract— We consider the problem of improving the performance of multiwavelets-based image coders through texture parametrization. Texture parametrization is designed to achieve...
Lahouari Ghouti, Ahmed Bouridane, Mohammad K. Ibra...
ACMSE
2005
ACM
15 years 3 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
MIR
2005
ACM
133views Multimedia» more  MIR 2005»
15 years 3 months ago
Probabilistic web image gathering
We propose a new method for automated large scale gathering of Web images relevant to specified concepts. Our main goal is to build a knowledge base associated with as many conce...
Keiji Yanai, Kobus Barnard
ATAL
2005
Springer
15 years 3 months ago
Automatic computer game balancing: a reinforcement learning approach
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
« Prev « First page 1106 / 1174 Last » Next »