Sciweavers

677 search results - page 133 / 136
» A New Start-Up Demonstration Test
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 9 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
JODL
2006
131views more  JODL 2006»
13 years 9 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
NN
2008
Springer
143views Neural Networks» more  NN 2008»
13 years 9 months ago
A batch ensemble approach to active learning with model selection
Optimally designing the location of training input points (active learning) and choosing the best model (model selection) are two important components of supervised learning and h...
Masashi Sugiyama, Neil Rubens
PAMI
2006
145views more  PAMI 2006»
13 years 9 months ago
Reflectance Sharing: Predicting Appearance from a Sparse Set of Images of a Known Shape
Three-dimensional appearance models consisting of spatially varying reflectance functions defined on a known shape can be used in analysis-by-synthesis approaches to a number of vi...
Todd Zickler, Ravi Ramamoorthi, Sebastian Enrique,...
SAC
2006
ACM
13 years 9 months ago
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems
Fast and accurate fault detection is becoming an essential component of management software for mission critical systems. A good fault detector makes possible to initiate repair a...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...