Sciweavers

883 search results - page 104 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
JCIT
2008
172views more  JCIT 2008»
13 years 10 months ago
Rough Wavelet Hybrid Image Classification Scheme
This paper introduces a new computer-aided classification system for detection of prostate cancer in Transrectal Ultrasound images (TRUS). To increase the efficiency of the comput...
Hala S. Own, Aboul Ella Hassanien
IPPS
2007
IEEE
14 years 4 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
EMNLP
2010
13 years 8 months ago
Soft Syntactic Constraints for Hierarchical Phrase-Based Translation Using Latent Syntactic Distributions
In this paper, we present a novel approach to enhance hierarchical phrase-based machine translation systems with linguistically motivated syntactic features. Rather than directly ...
Zhongqiang Huang, Martin Cmejrek, Bowen Zhou
SASO
2009
IEEE
14 years 5 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
UIC
2009
Springer
14 years 5 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...