Sciweavers

1493 search results - page 279 / 299
» Learning Concepts by Modeling Relationships
Sort
View
ITNG
2008
IEEE
15 years 3 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 2 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
ICANN
2010
Springer
14 years 8 months ago
Teaching Humanoids to Imitate 'Shapes' of Movements
Trajectory formation is one of the basic functions of the neuromotor controller. In particular, reaching, avoiding, controlling impacts (hitting), drawing, dancing and imitating ar...
Vishwanathan Mohan, Giorgio Metta, Jacopo Zenzeri,...
MM
2006
ACM
189views Multimedia» more  MM 2006»
15 years 3 months ago
Real-time computerized annotation of pictures
Automated annotation of digital pictures has been a highly challenging problem for computer scientists since the invention of computers. The capability of annotating pictures by c...
Jia Li, James Ze Wang
IPAW
2010
14 years 7 months ago
Reflections on Provenance Ontology Encodings
As more data (especially scientific data) is digitized and put on the Web, the importance of tracking and sharing its provenance metadata grows. Besides capturing the annotation pr...
Li Ding, Jie Bao, James Michaelis, Jun Zhao, Debor...