Sciweavers

734 search results - page 132 / 147
» Feature analysis for architectural evaluation methods
Sort
View
SDM
2008
SIAM
164views Data Mining» more  SDM 2008»
14 years 11 months ago
Randomizing Social Networks: a Spectrum Preserving Approach
Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. The nodes in the network are the individuals and...
Xiaowei Ying, Xintao Wu
ISCAPDCS
2004
14 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
CLEF
2010
Springer
14 years 10 months ago
The Wroclaw University of Technology Participation at ImageCLEF 2010 Photo Annotation Track
Abstract. In this paper we present three methods for image autoannotation used by the Wroclaw University of Technology group at ImageCLEF 2010 Photo Annotation track. All of our ex...
Michal Stanek, Oskar Maier, Halina Kwasnicka
CVPR
2007
IEEE
15 years 11 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
TEC
2002
133views more  TEC 2002»
14 years 9 months ago
Learning and optimization using the clonal selection principle
The clonal selection principle is used to explain the basic features of an adaptive immune response to an antigenic stimulus. It establishes the idea that only those cells that rec...
Leandro Nunes de Castro, Fernando J. Von Zuben