Sciweavers

4429 search results - page 792 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
ISCAPDCS
2003
13 years 10 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
FLAIRS
1998
13 years 10 months ago
Interactively Training Pixel Classifiers
Manual generation of training examples for supervised learning is an expensive process. One way to reduce this cost is to produce training instances that are highly informative. T...
Justus H. Piater, Edward M. Riseman, Paul E. Utgof...
WSCG
2003
310views more  WSCG 2003»
13 years 10 months ago
Effective Shadow Detection in Traffic Monitoring Applications
This paper presents work we have done in detecting moving shadows in the context of an outdoor traffic scene for visual surveillance purposes. The algorithm just exploits some for...
Alessandro Bevilacqua
IJCAI
1997
13 years 10 months ago
Reifying Concepts in Description Logics
Practical applications of description logics (DLs) in knowledge-based systems have forced us to introduce the following features which are absent from existing DLs: • allowing a...
Liviu Badea
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 10 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel