Sciweavers

4511 search results - page 619 / 903
» Observation Based System Security
Sort
View
ICDE
2001
IEEE
104views Database» more  ICDE 2001»
16 years 5 months ago
Bundles in Captivity: An Application of Superimposed Information
What do you do to make sense of a mass of information on a given topic? Paradoxically, you likely add yet more information to the pile: annotations, underlining, bookmarks, cross-...
Lois M. L. Delcambre, David Maier, Shawn Bowers, M...
ICPR
2004
IEEE
16 years 5 months ago
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces
Boosting-basedmethods have recently led to the state-ofthe-art face detection systems. In these systems, weak classifiers to be boosted are based on simple, local, Haar-like featu...
Daniel Gatica-Perez, Dong Zhang, Stan Z. Li
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 10 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
PADS
2006
ACM
15 years 10 months ago
Intelligent Management of Data Driven Simulations to Support Model Building
Artificial intelligence (AI) can contribute to the management of a data driven simulation system, in particular with regard to adaptive selection of data and refinement of the mo...
Catriona Kennedy, Georgios K. Theodoropoulos
DEXA
1995
Springer
96views Database» more  DEXA 1995»
15 years 7 months ago
Knowledge Organization for Exploration
To support applications, such as efficient browsing in large knowledge bases and cooperative knowledge discovery in large databases, the concept of rule similarity is essential. In...
Amihai Motro, Sylvie Goullioud