Sciweavers

6715 search results - page 1144 / 1343
» Learning from a Test Set
Sort
View
141
Voted
FIMH
2007
Springer
15 years 9 months ago
Constrained Reconstruction of Sparse Cardiac MR DTI Data
Magnetic resonance diffusion tensor imaging (DTI) has emerged as a convenient and reliable alternative to conventional histology for characterizing the fiber structure of the myoca...
Ganesh Adluru, Edward Hsu, Edward V. R. Di Bella
EDBT
2009
ACM
92views Database» more  EDBT 2009»
15 years 9 months ago
Efficient skyline computation in metric space
Given a set of n query points in a general metric space, a metricspace skyline (MSS) query asks what are the closest points to all these query points in the database. Here, consid...
David Fuhry, Ruoming Jin, Donghui Zhang
ACSAC
2004
IEEE
15 years 8 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
ASWEC
2004
IEEE
15 years 8 months ago
ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation
Network protocol implementations are susceptible to problems caused by their lack of ability to handle invalid inputs. We present ASPIRE: Automated Systematic Protocol Implementat...
Arunchandar Vasan, Atif M. Memon
COOPIS
2004
IEEE
15 years 8 months ago
Satin: A Component Model for Mobile Self Organisation
Abstract. We have recently witnessed a growing interest in self organising systems, both in research and in practice. These systems re-organise in response to new or changing condi...
Stefanos Zachariadis, Cecilia Mascolo, Wolfgang Em...
« Prev « First page 1144 / 1343 Last » Next »