Sciweavers

20833 search results - page 3969 / 4167
» Hidden process models
Sort
View
IPCCC
2007
IEEE
15 years 10 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
AB
2007
Springer
15 years 10 months ago
Algebraic Systems Biology: Theses and Hypotheses
What is systems biology? What can biologists gain from an attempt to algebraize the questions in systems biology? Starting with plausible biological theses, can one algebraically m...
Bud Mishra
APPROX
2007
Springer
112views Algorithms» more  APPROX 2007»
15 years 10 months ago
Encouraging Cooperation in Sharing Supermodular Costs
Abstract Consider a situation where a group of agents wishes to share the costs of their joint actions, and needs to determine how to distribute the costs amongst themselves in a f...
Andreas S. Schulz, Nelson A. Uhan
128
Voted
CIVR
2007
Springer
160views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Automatic image annotation by an iterative approach: incorporating keyword correlations and region matching
Automatic image annotation automatically labels image content with semantic keywords. For instance, the Relevance Model estimates the joint probability of the keyword and the imag...
Xiangdong Zhou, Mei Wang, Qi Zhang, Junqi Zhang, B...
CIVR
2007
Springer
139views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Video search in concept subspace: a text-like paradigm
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...
Xirong Li, Dong Wang, Jianmin Li, Bo Zhang
« Prev « First page 3969 / 4167 Last » Next »