Sciweavers

465 search results - page 92 / 93
» Rapid Development of Application-Specific Network Performanc...
Sort
View
98
Voted
CLEF
2010
Springer
14 years 10 months ago
Combination of Classifiers for Indoor Room Recognition CGS participation at ImageCLEF2010 Robot Vision Task
This paper represents a description of our approach to the problem of topological localization of a mobile robot using visual information. Our method has been developed for ImageCL...
Walter Lucetti, Emanuel Luchetti
JSS
2007
121views more  JSS 2007»
14 years 9 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
BMCBI
2011
14 years 4 months ago
Motif-guided sparse decomposition of gene expression data for regulatory module identification
Background: Genes work coordinately as gene modules or gene networks. Various computational approaches have been proposed to find gene modules based on gene expression data; for e...
Ting Gong, Jianhua Xuan, Li Chen, Rebecca B. Riggi...
83
Voted
WWW
2009
ACM
15 years 10 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin