Sciweavers

817 search results - page 19 / 164
» On 2-factors with k components
Sort
View
ICPR
2008
IEEE
15 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
IJCIM
2002
128views more  IJCIM 2002»
14 years 9 months ago
Web-based design and manufacturing systems for automobile components: architectures and usability studies
In this paper the architectures and usability issues of web-based software tools are discussed. For the development of automobile lighting components, various designers, developers...
Sung H. Ahn, Balaji Bharadwaj, Humayun Khalid, Shu...
DAS
2004
Springer
15 years 3 months ago
Adaptive Region Growing Color Segmentation for Text Using Irregular Pyramid
This paper presents the result of an adaptive region growing segmentation technique for color document images using an irregular pyramid structure. The emphasis is in the segmentat...
Poh Kok Loo, Chew Lim Tan
COMBINATORICS
2000
124views more  COMBINATORICS 2000»
14 years 9 months ago
Colouring Planar Mixed Hypergraphs
A mixed hypergraph is a triple H = (V, C, D) where V is the vertex set and C and D are families of subsets of V , the C-edges and D-edges, respectively. A k-colouring of H is a ma...
André Kündgen, Eric Mendelsohn, Vitaly...
MOC
2011
14 years 4 months ago
Error estimates for Raviart-Thomas interpolation of any order on anisotropic tetrahedra
Abstract. We prove optimal order error estimates for the Raviart-Thomas interpolation of arbitrary order under the maximum angle condition for triangles and under two generalizatio...
Gabriel Acosta, Thomas Apel, Ricardo G. Durá...