Sciweavers

7623 search results - page 1409 / 1525
» Algorithmic Features of Eclat
Sort
View
CN
2007
168views more  CN 2007»
13 years 8 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
IJCV
2006
159views more  IJCV 2006»
13 years 8 months ago
Wide Baseline Matching between Unsynchronized Video Sequences
3D reconstruction of a dynamic scene from features in two cameras usually requires synchronization and correspondences between the cameras. These may be hard to achieve due to occl...
Lior Wolf, Assaf Zomet
JOT
2008
228views more  JOT 2008»
13 years 8 months ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
JSS
2008
217views more  JSS 2008»
13 years 8 months ago
MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation
So far, many researches have been done to develop efficient music retrieval systems, and query-by-humming has been considered as one of the most intuitive and effective query meth...
Seungmin Rho, Byeong-jun Han, Eenjun Hwang, Minkoo...
JUCS
2006
117views more  JUCS 2006»
13 years 8 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
« Prev « First page 1409 / 1525 Last » Next »