Sciweavers

1717 search results - page 117 / 344
» Error concealment using a diffusion based method
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 8 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
SIGIR
2009
ACM
15 years 9 months ago
Experiments in CLIR using fuzzy string search based on surface similarity
Cross Language Information Retrieval (CLIR) between languages of the same origin is an interesting topic of research. The similarity of the writing systems used for these language...
Sethuramalingam Subramaniam, Anil Kumar Singh, Pra...
ISBI
2004
IEEE
16 years 3 months ago
Statistical Surface-Based Morphometry Using a Non-Parametric Approach
We present a novel method of statistical surface-based morphometry based on the use of non-parametric permutation tests. In order to evaluate morphologicaldifferences of brain str...
Dimitrios Pantazis, Richard M. Leahy, Thomas E. Ni...
VAST
2004
ACM
15 years 8 months ago
Image-Based Registration of 3D-Range Data Using Feature Surface Elements
Digitizing real-life objects via range scanners, stereo vision or tactile sensors usually requires the composition of multiple range images. In this paper we exploit intensity ima...
Gerhard H. Bendels, Patrick Degener, Roland Wahl, ...
DAC
2008
ACM
16 years 3 months ago
Symbolic noise analysis approach to computational hardware optimization
This paper addresses the problem of computational error modeling and analysis. Choosing different word-lengths for each functional unit in hardware implementations of numerical al...
Arash Ahmadi, Mark Zwolinski