Sciweavers

1522 search results - page 136 / 305
» Distinctiveness of faces: A computational approach
Sort
View
CEC
2009
IEEE
15 years 5 months ago
Search methodologies for efficient planetary site selection
Landing on distant planets is always a challenging task due to the distance and hostile environments found. In the design of autonomous hazard avoidance systems we find the particu...
Luís F. Simões, Tiago C. Pais, Rita ...
LISA
2004
15 years 3 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard
ACSAC
2004
IEEE
15 years 5 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
132
Voted
BMCBI
2006
125views more  BMCBI 2006»
15 years 1 months ago
Evaluating different methods of microarray data normalization
Background: With the development of DNA hybridization microarray technologies, nowadays it is possible to simultaneously assess the expression levels of thousands to tens of thous...
André Fujita, João Ricardo Sato, Leo...
ICIDS
2009
Springer
15 years 8 months ago
Directorial Control in a Decision-Theoretic Framework for Interactive Narrative
Computer aided interactive narrative has received increasing attention in recent years. Automated directorial control that manages the development of the story in the face of user ...
Mei Si, Stacy C. Marsella, David V. Pynadath