Sciweavers

1782 search results - page 282 / 357
» A Data Transformation Method Based on Schema Mapping
Sort
View
172
Voted
ICCV
2011
IEEE
14 years 4 months ago
The Power of Comparative Reasoning
Rank correlation measures are known for their resilience to perturbations in numeric values and are widely used in many evaluation metrics. Such ordinal measures have rarely been ...
Jay Yagnik, Dennis Strelow, David Ross, Ruei-sung ...
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 7 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
164
Voted
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
15 years 7 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
SEMWEB
2009
Springer
15 years 10 months ago
A Database Backend for OWL
Abstract. Most Semantic Web applications are build on top of technology based on the Semantic Web layer cake and the W3C ontology languages RDF(S) and OWL. However RDF(S) embodies ...
Jörg Henss, Joachim Kleb, Stephan Grimm
105
Voted
ICASSP
2010
IEEE
15 years 4 months ago
Multi-object filtering from image sequence without detection
Almost every single-view visual multi-target tracking method presented in the literature includes a detection routine that maps the image data to point measurements relevant to th...
Reza Hoseinnezhad, Ba-Ngu Vo, David Suter, Ba-Tuon...