Sciweavers

1557 search results - page 56 / 312
» Autonomous Applications - Towards a Better Data Integration ...
Sort
View
TR
2008
98views more  TR 2008»
13 years 9 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
ESCIENCE
2005
IEEE
14 years 2 months ago
The Supplier Model for Legacy Applications in a Grid
The use of web services as the basis for grid middleware has allowed scientists to wrap legacy applications as services in order to provide their capabilities to grid users. Howev...
Jonathan Giddy, Ian J. Grimstead, Jason Jones
CVPR
1998
IEEE
14 years 11 months ago
Incorporating Illumination Constraints in Deformable Models
In this paper we present a method for the integration of nonlinear holonomic constraints in deformable models and its application to the problems of shape and illuminant direction...
Dimitris Samaras, Dimitris N. Metaxas
CLUSTER
2009
IEEE
14 years 3 months ago
An innovative application execution toolkit for multicluster grids
—Multicluster grids provide one promising solution to satisfying growing computation demands of compute-intensive applications by collaborating various networked clusters. Howeve...
Zhifeng Yun, Zhou Lei, Gabrielle Allen, Daniel S. ...
BMCBI
2010
182views more  BMCBI 2010»
13 years 9 months ago
L2-norm multiple kernel learning and its application to biomedical data fusion
Background: This paper introduces the notion of optimizing different norms in the dual problem of support vector machines with multiple kernels. The selection of norms yields diff...
Shi Yu, Tillmann Falck, Anneleen Daemen, Lé...