Sciweavers

1356 search results - page 142 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
IDA
2010
Springer
14 years 1 months ago
Using CAPTCHAs to Index Cultural Artifacts
: Rock art, human-made markings on stone, is an important cultural and the earliest expression of abstract thinking. While there are tens of millions of photographs of rock art in ...
Qiang Zhu 0002, Eamonn J. Keogh
CSDA
2010
157views more  CSDA 2010»
13 years 8 months ago
Robust estimation of constrained covariance matrices for confirmatory factor analysis
Confirmatory factor analysis (CFA) is a data anylsis procedure that is widely used in social and behavioral sciences in general and other applied sciences that deal with large qua...
E. Dupuis Lozeron, M. P. Victoria-Feser
DOA
2001
137views more  DOA 2001»
13 years 9 months ago
Supporting Distributed Processing of Time-Based Media Streams
There are many challenges in devising solutions for online content processing of live networked multimedia sessions. These include content analysis under uncertainty (evidence of ...
Viktor S. Wold Eide, Frank Eliassen, Olav Lysne
BMCBI
2008
132views more  BMCBI 2008»
13 years 8 months ago
The Average Mutual Information Profile as a Genomic Signature
Background: Occult organizational structures in DNA sequences may hold the key to understanding functional and evolutionary aspects of the DNA molecule. Such structures can also p...
Mark Bauer, Sheldon M. Schuster, Khalid Sayood
CSE
2009
IEEE
14 years 3 months ago
Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal
—This paper reports on measurement results for the simultaneous use of multiple WLAN APs in a large area. We describe some problems of applying legacy IEEE 802.11 WLAN technologi...
Hyun-Sung Park, Seung-Ho Han, Jong-Deok Kim