Sciweavers

12551 search results - page 2432 / 2511
» Informative Discriminant Analysis
Sort
View
KESAMSTA
2009
Springer
15 years 2 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
ECCV
2010
Springer
15 years 2 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more diď¬...
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MICCAI
2001
Springer
15 years 2 months ago
Automatic Construction of 3D Statistical Deformation Models Using Non-rigid Registration
Abstract. In this paper we introduce the concept of statistical deformation models (SDM) which allow the construction of average models of the anatomy and their variability. SDMs a...
Daniel Rueckert, Alejandro F. Frangi, Julia A. Sch...
VLDB
2001
ACM
190views Database» more  VLDB 2001»
15 years 2 months ago
LEO - DB2's LEarning Optimizer
Most modern DBMS optimizers rely upon a cost model to choose the best query execution plan (QEP) for any given query. Cost estimates are heavily dependent upon the optimizer’s e...
Michael Stillger, Guy M. Lohman, Volker Markl, Mok...
« Prev « First page 2432 / 2511 Last » Next »