Sciweavers

7544 search results - page 1352 / 1509
» Network Forensics Analysis
Sort
View
ICIAR
2005
Springer
15 years 10 months ago
On the Individuality of the Iris Biometric
We consider quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distingui...
Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yill...
IPMI
2005
Springer
15 years 10 months ago
Automated Detection of Small-Size Pulmonary Nodules Based on Helical CT Images
Abstract. A computer-aided diagnosis (CAD) system to detect smallsize (from 2 mm to around 10 mm) pulmonary nodules in helical CT scans is developed. This system uses different sc...
Xiangwei Zhang, Geoffrey McLennan, Eric A. Hoffman...
ISNN
2005
Springer
15 years 10 months ago
An Improvement on PCA Algorithm for Face Recognition
Principle Component Analysis (PCA) technique is an important and well-developed area of image recognition and to date many linear discrimination methods have been put forward. Desp...
Vo Dinh Minh Nhat, Sungyoung Lee
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
15 years 10 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
POLICY
2005
Springer
15 years 10 months ago
Using Linear Temporal Model Checking for Goal-Oriented Policy Refinement Frameworks
Policy refinement is meant to derive lower-level policies from higher-level ones so that these more specific policies are better suited for use in different execution environments...
Javier Rubio-Loyola, Joan Serrat, Marinos Charalam...
« Prev « First page 1352 / 1509 Last » Next »