Sciweavers

36320 search results - page 7188 / 7264
» From Code to Models
Sort
View
DAM
2010
112views more  DAM 2010»
15 years 3 months ago
New results on optimizing rooted triplets consistency
Abstract. A set of phylogenetic trees with overlapping leaf sets is consistent if it can be merged without conflicts into a supertree. In this paper, we study the polynomial-time a...
Jaroslaw Byrka, Sylvain Guillemot, Jesper Jansson
CVIU
2008
192views more  CVIU 2008»
15 years 3 months ago
Content based video matching using spatiotemporal volumes
This paper presents a novel framework for matching video sequences using the spatiotemporal segmentation of videos. Instead of using appearance features for region correspondence ...
Arslan Basharat, Yun Zhai, Mubarak Shah
DATAMINE
2008
137views more  DATAMINE 2008»
15 years 3 months ago
Two heads better than one: pattern discovery in time-evolving multi-aspect data
Abstract. Data stream values are often associated with multiple aspects. For example, each value observed at a given time-stamp from environmental sensors may have an associated ty...
Jimeng Sun, Charalampos E. Tsourakakis, Evan Hoke,...
DCG
2008
118views more  DCG 2008»
15 years 3 months ago
General-Dimensional Constrained Delaunay and Constrained Regular Triangulations, I: Combinatorial Properties
Two-dimensional constrained Delaunay triangulations are geometric structures that are popular for interpolation and mesh generation because they respect the shapes of planar domai...
Jonathan Richard Shewchuk
AHSWN
2006
206views more  AHSWN 2006»
15 years 3 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
« Prev « First page 7188 / 7264 Last » Next »