Sciweavers

437 search results - page 26 / 88
» An Effective Promoter Detection Method using the Adaboost Al...
Sort
View
PR
2008
178views more  PR 2008»
13 years 6 months ago
An effective and fast iris recognition system based on a combined multiscale feature extraction technique
The randomness of iris pattern makes it one of the most reliable biometric traits. On the other hand, the complex iris image structure and the various sources of intra-class varia...
Makram Nabti, Ahmed Bouridane
CGA
2005
13 years 7 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
ATC
2007
Springer
14 years 1 months ago
Stepping-Stone Detection Via Request-Response Traffic Analysis
Abstract. In this paper, we develop an algorithm that may be used as a stepping-stone detection tool. Our approach is based on analyzing correlations between the cumulative number ...
Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Y...
ACST
2006
13 years 9 months ago
A combinatorial group testing method for FPGA fault location
Adaptive fault isolation methods based on discrepancyenabled pairwise comparisons are developed for reconfigurable logic devices. By observing the discrepancy characteristics of m...
Carthik A. Sharma, Ronald F. DeMara
ICASSP
2007
IEEE
14 years 1 months ago
Spatiotemporal Algorithm for Background Subtraction
Background modeling and subtraction is a fundamental task in many computer vision and video processing applications. We present a novel probabilistic background modeling and subtr...
S. Derin Babacan, Thrasyvoulos N. Pappas