Sciweavers

1111 search results - page 220 / 223
» A Conceptual Modeling Technique Based on Semantically Comple...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 26 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
14 years 22 days ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
CVPR
2008
IEEE
14 years 9 months ago
Automatic non-rigid registration of 3D dynamic data for facial expression synthesis and transfer
Automatic non-rigid registration of 3D time-varying data is fundamental in many vision and graphics applications such as facial expression analysis, synthesis, and recognition. De...
Sen Wang, Xianfeng David Gu, Hong Qin
ICIP
2001
IEEE
14 years 9 months ago
Coding for the storage and communication of visualisations of 3D medical data
The transmission of the large store of information contained in 3D medical data sets through limited capacity channels, is a critical procedure in many telemedicine applications. ...
Dimitrios Tzovaras, Michael G. Strintzis, Nikolaos...
TPHOL
2007
IEEE
14 years 1 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao