Sciweavers

210 search results - page 28 / 42
» Evaluating and comparing three text-production techniques
Sort
View
MVA
2008
201views Computer Vision» more  MVA 2008»
14 years 9 months ago
How close are we to solving the problem of automated visual surveillance?
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
Hannah M. Dee, Sergio A. Velastin
GRAPHICSINTERFACE
2001
14 years 11 months ago
3D Scene Manipulation with 2D Devices and Constraints
Content creation for computer graphics applications is a laborious process that requires skilled personnel. One fundamental problem is that manipulation of 3D objects with 2D user...
Graham Smith, Wolfgang Stürzlinger, Tim Salzm...
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
GECCO
2003
Springer
129views Optimization» more  GECCO 2003»
15 years 2 months ago
Inherent Fault Tolerance in Evolved Sorting Networks
This poster paper summarizes our research on fault tolerance arising as a by-product of the evolutionary computation process. Past research has shown evidence of robustness emergin...
Rob Shepherd, James A. Foster
RECSYS
2010
ACM
14 years 9 months ago
Recommending based on rating frequencies
Since the development of the comparably simple neighborhood-based methods in the 1990s, a plethora of techniques has been developed to improve various aspects of collaborative fil...
Fatih Gedikli, Dietmar Jannach