Sciweavers

6693 search results - page 1047 / 1339
» Methods of Automatic Algorithm Generation
Sort
View
CSREASAM
2006
15 years 4 months ago
Firewall Design: Understandable, Designable and Testable
Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, ...
Yan-ning Huang, Yong Jiang
AIPS
2003
15 years 4 months ago
Planning for Marketing Campaigns
In business marketing, corporations and institutions are interested in executing a sequence of marketing actions to affect a group of customers. For example, a financial instituti...
Qiang Yang, Hong Cheng
139
Voted
ICMLA
2004
15 years 4 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague
150
Voted
ICVGIP
2004
15 years 4 months ago
Use of Linear Diffusion in Depth Estimation Based on Defocus Cue
Diffusion has been used extensively in computer vision. Most common applications of diffusion have been in low level vision problems like segmentation and edge detection. In this ...
Vinay P. Namboodiri, Subhasis Chaudhuri
136
Voted
DICTA
2003
15 years 4 months ago
Computing Image-Based Reprojection Error on Graphics Hardware
This paper describes a novel approach to the problem of recovering information from an image set by comparing the radiance of hypothesised point correspondences. This method is app...
John W. Bastian, Anton van den Hengel
« Prev « First page 1047 / 1339 Last » Next »