Sciweavers

1356 search results - page 259 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
WWW
2006
ACM
14 years 8 months ago
Image annotation using search and mining technologies
In this paper, we present a novel solution to the image annotation problem which annotates images using search and data mining technologies. An accurate keyword is required to ini...
Xin-Jing Wang, Lei Zhang, Feng Jing, Wei-Ying Ma
APLAS
2009
ACM
14 years 2 months ago
Asymptotic Resource Usage Bounds
When describing the resource usage of a program, it is usual to talk in asymptotic terms, such as the well-known “big O” notation, whereby we focus on the behaviour of the prog...
Elvira Albert, Diego Alonso, Puri Arenas, Samir Ge...
CEC
2007
IEEE
14 years 2 months ago
Covariance matrix repairing in Gaussian based EDAs
— Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs). In this paper, we analyze continuous EDAs and show that they don’t always work ...
Weishan Dong, Xin Yao
FGR
2006
IEEE
284views Biometrics» more  FGR 2006»
14 years 1 months ago
A 3D Facial Expression Database For Facial Behavior Research
Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations....
Lijun Yin, Xiaozhou Wei, Yi Sun, Jun Wang, Matthew...
JAIR
2006
89views more  JAIR 2006»
13 years 7 months ago
Distributed Reasoning in a Peer-to-Peer Setting: Application to the Semantic Web
In a peer-to-peer inference system, each peer can reason locally but can also solicit some of its acquaintances, which are peers sharing part of its vocabulary. In this paper, we ...
Philippe Adjiman, Philippe Chatalic, Franço...