Sciweavers

4466 search results - page 617 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
123
Voted
ISI
2006
Springer
15 years 4 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
15 years 10 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
ICDE
2009
IEEE
148views Database» more  ICDE 2009»
16 years 5 months ago
Online Interval Skyline Queries on Time Series
In many applications, we need to analyze a large number of time series. Segments of time series demonstrating dominating advantages over others are often of particular interest. In...
Bin Jiang, Jian Pei
WCE
2007
15 years 5 months ago
Applying EM Algorithm for Segmentation of Textured Images
— Texture analysis plays an increasingly important role in computer vision. Since the textural properties of images appear to carry useful information for discrimination purposes...
K. Revathy, V. S. Roshni
AI
1999
Springer
15 years 3 months ago
Cooperative Behavior Acquisition for Mobile Robots in Dynamically Changing Real Worlds Via Vision-Based Reinforcement Learning a
In this paper, we first discuss the meaning of physical embodiment and the complexity of the environment in the context of multi-agent learning. We then propose a vision-based rei...
Minoru Asada, Eiji Uchibe, Koh Hosoda