Sciweavers

1396 search results - page 90 / 280
» A Tale of Two Futures
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 10 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
CORR
2008
Springer
59views Education» more  CORR 2008»
13 years 10 months ago
A global physician-oriented medical information system
Abstract. We propose an Internet-based, free, world-wide, centralized medical information system with two main target groups: practicing physicians and medical researchers. After a...
Axel Boldt, Michael Janich
EOR
2008
96views more  EOR 2008»
13 years 10 months ago
Round robin scheduling - a survey
Abstract This paper presents a comprehensive survey on the literature considering round robin tournaments. The terminology used within the area has been modified over time and toda...
Rasmus V. Rasmussen, Michael A. Trick
IJON
2006
109views more  IJON 2006»
13 years 10 months ago
Associative memory of connectivity patterns
The goal of the visual correspondence problem is to establish a connectivity pattern (a mapping) between two images such that features projected from the same scene point are conn...
Junmei Zhu, Christoph von der Malsburg
MTA
2006
173views more  MTA 2006»
13 years 10 months ago
Active learning in very large databases
Abstract. Query-by-example and query-by-keyword both suffer from the problem of "aliasing," meaning that example-images and keywords potentially have variable interpretat...
Navneet Panda, Kingshy Goh, Edward Y. Chang