Sciweavers

2011 search results - page 238 / 403
» MRA data segmentation using level sets
Sort
View
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
COLING
2010
14 years 11 months ago
Enhancing Cross Document Coreference of Web Documents with Context Similarity and Very Large Scale Text Categorization
Cross Document Coreference (CDC) is the task of constructing the coreference chain for mentions of a person across a set of documents. This work offers a holistic view of using do...
Jian Huang 0002, Pucktada Treeratpituk, Sarah M. T...
FPL
2007
Springer
115views Hardware» more  FPL 2007»
15 years 10 months ago
Hardware/Software Process Migration and RTL Simulation
This paper describes an execution cache that uses process migration between hardware and software contexts by way of run-time reconfiguration (RTR) of Field Programmable Gate Arr...
Aric D. Blumer, Cameron D. Patterson
ISMIR
2005
Springer
179views Music» more  ISMIR 2005»
15 years 9 months ago
Databionic Visualization of Music Collections According to Perceptual Distance
We describe the MusicMiner system for organizing large collections of music with databionic mining techniques. Low level audio features are extracted from the raw audio data on sh...
Fabian Mörchen, Alfred Ultsch, Mario Nöc...
IPMI
2005
Springer
16 years 4 months ago
Regional Whole Body Fat Quantification in Mice
Obesity has risen to epidemic levels in the United States and around the world. Global indices of obesity such as the body mass index (BMI) have been known to be inaccurate predict...
Xenophon Papademetris, Pavel Shkarin, Lawrence H. ...