Sciweavers

2191 search results - page 351 / 439
» Evolutionary testing of classes
Sort
View
154
Voted
CISS
2007
IEEE
15 years 9 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
GLOBECOM
2007
IEEE
15 years 9 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
145
Voted
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 9 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
ICDM
2007
IEEE
150views Data Mining» more  ICDM 2007»
15 years 9 months ago
Connections between Mining Frequent Itemsets and Learning Generative Models
Frequent itemsets mining is a popular framework for pattern discovery. In this framework, given a database of customer transactions, the task is to unearth all patterns in the for...
Srivatsan Laxman, Prasad Naldurg, Raja Sripada, Ra...
120
Voted
ICRA
2007
IEEE
121views Robotics» more  ICRA 2007»
15 years 9 months ago
Models for the Design of a Tendon Driven Robot Eye
Eye motion strategies in animals and humans have v e2 h2 the goal of optimizing visual perception, therefore, the study of eye motions plays an important role in the design of huma...
Giorgio Cannata, Marco Maggiali