Sciweavers

1997 search results - page 365 / 400
» A Model for Data Leakage Detection
Sort
View
IPCV
2007
14 years 12 days ago
Tracking Multiple Sports Players for Mobile Display
- An architecture system and a method for tracking people are presented for sports applications. The system’s input is video data from static camera and the output is the real wo...
Andreas Aristidou, Paul Pangalos, Hamid Aghvami
NIPS
2008
14 years 12 days ago
Scalable Algorithms for String Kernels with Inexact Matching
We present a new family of linear time algorithms based on sufficient statistics for string comparison with mismatches under the string kernels framework. Our algorithms improve t...
Pavel P. Kuksa, Pai-Hsi Huang, Vladimir Pavlovic
BIOCOMP
2006
14 years 11 days ago
An Approach to Selecting Putative RNA Motifs Using MDL Principle
The history of molecular biology is punctuated by a series of discoveries demonstrating the surprising breadth of biological roles of ribonucleic acid (RNA). An ensemble of evoluti...
Mohammad Anwar, Marcel Turcotte
ISCAPDCS
2004
14 years 11 days ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
CG
2008
Springer
13 years 11 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...