Sciweavers

7886 search results - page 1394 / 1578
» An evaluation of bipartitioning techniques
Sort
View
AUSAI
2008
Springer
13 years 10 months ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
BPM
2008
Springer
217views Business» more  BPM 2008»
13 years 10 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...
CCS
2008
ACM
13 years 10 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
ECCV
2006
Springer
13 years 10 months ago
Spatial Intensity Correction of Fluorescent Confocal Laser Scanning Microscope Images
Abstract. This paper addresses the problem of intensity correction of fluorescent confocal laser scanning microscope (CLSM) images. CLSM images are frequently used in medical domai...
Sang-Chul Lee, Peter Bajcsy
PET
2010
Springer
13 years 10 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
« Prev « First page 1394 / 1578 Last » Next »