Sciweavers

953 search results - page 113 / 191
» INEX 2007 Evaluation Measures
Sort
View
105
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 1 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
IJRR
2007
80views more  IJRR 2007»
15 years 1 months ago
Fast Laser Scan Matching using Polar Coordinates
In this paper a novel Polar Scan Matching (PSM) approach is described that works in the laser scanner’s polar coordinate system, therefore taking advantage of the structure of t...
Albert Diosi, Lindsay Kleeman
INFORMATICALT
2007
92views more  INFORMATICALT 2007»
15 years 1 months ago
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images
Abstract. The paper considers application of stochastic optimization to system of automatic recognition of ischemic stroke area on computed tomography (CT) images. The algorithm of...
Darius Grigaitis, Vaida Bartkute, Leonidas Sakalau...
IPM
2007
101views more  IPM 2007»
15 years 1 months ago
Decisions in thesaurus construction and use
A thesaurus and an ontology provide a set of structured terms, phrases, and metadata, often in a hierarchical arrangement, that may be used to index, search, and mine documents. W...
Robert M. Losee
112
Voted
MT
2007
91views more  MT 2007»
15 years 1 months ago
A method of creating new valency entries
Information on subcategorization and selectional restrictions is important for natural language processing tasks such as deep parsing, rule-based machine translation and automatic...
Sanae Fujita, Francis Bond