Sciweavers

13180 search results - page 2469 / 2636
» Network Models
Sort
View
135
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 7 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
135
Voted
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes
111
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
155
Voted
AIRS
2006
Springer
15 years 7 months ago
A Novel Ant-Based Clustering Approach for Document Clustering
Recently, much research has been proposed using nature inspired algorithms to perform complex machine learning tasks. Ant Colony Optimization (ACO) is one such algorithm based on s...
Yulan He, Siu Cheung Hui, Yongxiang Sim
156
Voted
AMDO
2006
Springer
15 years 7 months ago
Human Motion Synthesis by Motion Manifold Learning and Motion Primitive Segmentation
Abstract. We propose motion manifold learning and motion primitive segmentation framework for human motion synthesis from motion-captured data. High dimensional motion capture date...
Chan-Su Lee, Ahmed M. Elgammal
« Prev « First page 2469 / 2636 Last » Next »