Sciweavers

4511 search results - page 835 / 903
» Observation Based System Security
Sort
View
APVIS
2009
14 years 11 months ago
Visibility-driven transfer functions
Direct volume rendering is an important tool for visualizing complex data sets. However, in the process of generating 2D images from 3D data, information is lost in the form of at...
Carlos D. Correa, Kwan-Liu Ma
CVIU
2007
137views more  CVIU 2007»
14 years 9 months ago
Visual learning of texture descriptors for facial expression recognition in thermal imagery
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...
Benjamín Hernández, Gustavo Olague, ...
WISE
2010
Springer
14 years 7 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
SAC
2011
ACM
14 years 21 days ago
Type harvesting: a practical approach to obtaining typing information in dynamic programming languages
Dynamically typed programming languages are powerful tools for rapid software development. However, there are scenarios that would benefit from actual type information being avai...
Michael Haupt, Michael Perscheid, Robert Hirschfel...
INFOCOM
2012
IEEE
13 years 9 days ago
SageShift: Managing SLAs for highly consolidated cloud
– Maximizing consolidation ratio, the number of virtual machines (VMs) in a physical machine, without violating customers’ SLAs is an important goal in the cloud. We show that ...
Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim