Sciweavers

2748 search results - page 316 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
CCS
2005
ACM
15 years 10 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ATC
2008
Springer
15 years 6 months ago
Scheduling for Reliable Execution in Autonomic Systems
Abstract. Scheduling the execution of multiple concurrent tasks on shared resources such as CPUs and network links is essential to ensuring the reliable operation of many autonomic...
Terry Tidwell, Robert Glaubius, Christopher D. Gil...
166
Voted
CVPR
2007
IEEE
16 years 6 months ago
Removal of Image Artifacts Due to Sensor Dust
Image artifacts that result from sensor dust are a common but annoying problem for many photographers. To reduce the appearance of dust in an image, we first formulate a model of ...
Changyin Zhou, Stephen Lin
146
Voted
CSB
2005
IEEE
165views Bioinformatics» more  CSB 2005»
15 years 6 months ago
Sequential Diagonal Linear Discriminant Analysis (SeqDLDA) for Microarray Classification and Gene Identification
In microarray classification we are faced with a very large number of features and very few training samples. This is a challenge for classical Linear Discriminant Analysis (LDA),...
Roger Pique-Regi, Antonio Ortega, Shahab Asgharzad...
ECCV
2010
Springer
15 years 9 months ago
ClassCut for Unsupervised Class Segmentation
Abstract. We propose a novel method for unsupervised class segmentation on a set of images. It alternates between segmenting object instances and learning a class model. The method...