Sciweavers

5128 search results - page 870 / 1026
» Discrete Component Analysis
Sort
View
109
Voted
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
15 years 7 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
103
Voted
QSIC
2006
IEEE
15 years 7 months ago
Software Project Level Estimation Model Framework based on Bayesian Belief Networks
Software estimation models should support managerial decision making in software projects. We experience that most of current models do not achieve this goal to the extend manager...
Hao Wang, Fei Peng, Chao Zhang, Andrej Pietschker
108
Voted
ACCV
2006
Springer
15 years 7 months ago
Occlusion Invariant Face Recognition Using Selective LNMF Basis Images
In this paper, we propose a novel occlusion invariant face recognition algorithm based on Selective Local Nonnegative Matrix Factorization (S-LNMF) technique. The proposed algorith...
Hyun Jun Oh, Kyoung Mu Lee, Sang Uk Lee, Chung-Hyu...
101
Voted
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
15 years 7 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst
104
Voted
MINENET
2006
ACM
15 years 7 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...