Sciweavers

6087 search results - page 1157 / 1218
» Knowledge discovery methods
Sort
View
119
Voted
KCAP
2009
ACM
15 years 10 months ago
Sharing and reusing aligned ontologies with cupboard
This demo presents the Cupboard online system for sharing and reusing ontologies linked together with alignments, and that are attached to rich metadata and reviews. Categories an...
Mathieu d'Aquin, Jérôme Euzenat, Chan...
134
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ECRTS
2008
IEEE
15 years 10 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
ICASSP
2008
IEEE
15 years 10 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli
129
Voted
ICC
2008
IEEE
110views Communications» more  ICC 2008»
15 years 10 months ago
Antenna Selection for Next Generation IEEE 802.16 Mobile Stations
The IEEE 802.16/WiMAX standard has fully embraced multi-antenna technology and can, thus, deliver robust and high transmission rates and higher system capacity. Nevertheless, due ...
Chun Nie, Zhifeng Tao, Neelesh B. Mehta, Andreas F...
« Prev « First page 1157 / 1218 Last » Next »