Sciweavers

8080 search results - page 1404 / 1616
» From Computer Networks to Agent Networks
Sort
View
154
Voted
JSS
2006
132views more  JSS 2006»
15 years 4 months ago
FMF: Query adaptive melody retrieval system
Recent progress of computer and network technologies makes it possible to store and retrieve a large volume of multimedia data in many applications. In such applications, efficien...
Seungmin Rho, Eenjun Hwang
TIP
2008
126views more  TIP 2008»
15 years 4 months ago
Maximum-Entropy Expectation-Maximization Algorithm for Image Reconstruction and Sensor Field Estimation
Abstract--In this paper, we propose a maximum-entropy expectation-maximization (MEEM) algorithm. We use the proposed algorithm for density estimation. The maximum-entropy constrain...
Hunsop Hong, Dan Schonfeld
TITB
2008
156views more  TITB 2008»
15 years 4 months ago
Large-Scale Biomedical Image Analysis in Grid Environments
Abstract--This paper presents the application of a componentbased Grid middleware system for processing extremely large images obtained from digital microscopy devices. We have dev...
Vijay S. Kumar, Benjamin Rutt, Tahsin M. Kur&ccedi...
JUCS
2007
133views more  JUCS 2007»
15 years 4 months ago
Building Immersive Conversation Environment Using Locomotive Interactive Character
: Generating composite human motion such as locomotion and gestures is important for interactive applications, such as interactive storytelling and computer games. In interactive s...
Rai Chan, Junichi Hoshino
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 4 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
« Prev « First page 1404 / 1616 Last » Next »