Sciweavers

6293 search results - page 1081 / 1259
» Information Flow Testing
Sort
View
143
Voted
TNN
2008
94views more  TNN 2008»
15 years 4 months ago
Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions
There usually exist many kinds of variations in face images taken under uncontrolled conditions, such as changes of pose, illumination, expression, etc. Most previous works on fac...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles
TOG
2008
106views more  TOG 2008»
15 years 4 months ago
BSGP: bulk-synchronous GPU programming
We present BSGP, a new programming language for general purpose computation on the GPU. A BSGP program looks much the same as a sequential C program. Programmers only need to supp...
Qiming Hou, Kun Zhou, Baining Guo
TOIS
2008
105views more  TOIS 2008»
15 years 4 months ago
Sound and complete relevance assessment for XML retrieval
In information retrieval research, comparing retrieval approaches requires test collections consisting of documents, user requests and relevance assessments. Obtaining relevance a...
Benjamin Piwowarski, Andrew Trotman, Mounia Lalmas
137
Voted
JMM2
2007
148views more  JMM2 2007»
15 years 4 months ago
Object Segmentation Using Background Modelling and Cascaded Change Detection
— The automatic extraction and analysis of visual information is becoming generalised. The first step in this processing chain is usually separating or segmenting the captured v...
Luís Filipe Teixeira, Jaime S. Cardoso, Lu&...
TSMC
2008
172views more  TSMC 2008»
15 years 4 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
« Prev « First page 1081 / 1259 Last » Next »