Sciweavers

2109 search results - page 356 / 422
» Vector Processing in Ada
Sort
View
136
Voted
IDEAL
2004
Springer
15 years 9 months ago
Kernel Density Construction Using Orthogonal Forward Regression
Abstract— The paper presents an efficient construction algorithm for obtaining sparse kernel density estimates based on a regression approach that directly optimizes model gener...
Sheng Chen, Xia Hong, Chris J. Harris
170
Voted
PCM
2004
Springer
119views Multimedia» more  PCM 2004»
15 years 9 months ago
Temporal Error Concealment with Block Boundary Smoothing
Abstract. When a block is lost due to a transmission error in compressed bitstream, conventional temporal error concealment schemes try to conceal the lost block by recovering its ...
Woong Il Choi, Byeungwoo Jeon
118
Voted
PROFES
2004
Springer
15 years 9 months ago
Effort Estimation Based on Collaborative Filtering
Effort estimation methods are one of the important tools for project managers in controlling human resources of ongoing or future software projects. The estimations require histori...
Naoki Ohsugi, Masateru Tsunoda, Akito Monden, Ken-...
122
Voted
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 9 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
CW
2003
IEEE
15 years 9 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi