Sciweavers

6087 search results - page 1157 / 1218
» Knowledge discovery methods
Sort
View
KCAP
2009
ACM
15 years 4 months ago
Sharing and reusing aligned ontologies with cupboard
This demo presents the Cupboard online system for sharing and reusing ontologies linked together with alignments, and that are attached to rich metadata and reviews. Categories an...
Mathieu d'Aquin, Jérôme Euzenat, Chan...
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ECRTS
2008
IEEE
15 years 4 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
ICASSP
2008
IEEE
15 years 4 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli
ICC
2008
IEEE
110views Communications» more  ICC 2008»
15 years 4 months ago
Antenna Selection for Next Generation IEEE 802.16 Mobile Stations
The IEEE 802.16/WiMAX standard has fully embraced multi-antenna technology and can, thus, deliver robust and high transmission rates and higher system capacity. Nevertheless, due ...
Chun Nie, Zhifeng Tao, Neelesh B. Mehta, Andreas F...
« Prev « First page 1157 / 1218 Last » Next »