Sciweavers

853 search results - page 150 / 171
» New test approach for embedded applications
Sort
View
ICIP
2008
IEEE
16 years 1 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
ICDE
2003
IEEE
144views Database» more  ICDE 2003»
16 years 1 months ago
Scalable template-based query containment checking for web semantic caches
Semantic caches, originally proposed for client-server database systems, are being recently deployed to accelerate the serving of dynamic web content by transparently caching data...
Khalil Amiri, Sanghyun Park, Renu Tewari, Sriram P...
ICML
1998
IEEE
16 years 17 days ago
An Efficient Boosting Algorithm for Combining Preferences
We study the problem of learning to accurately rank a set of objects by combining a given collection of ranking or preference functions. This problem of combining preferences aris...
Yoav Freund, Raj D. Iyer, Robert E. Schapire, Yora...
KDD
2003
ACM
133views Data Mining» more  KDD 2003»
16 years 5 days ago
Interactive Analysis of Gene Interactions Using Graphical gaussian model
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Xintao Wu, Yong Ye, Kalpathi R. Subramanian
ESORICS
2007
Springer
15 years 6 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano