Sciweavers

1995 search results - page 327 / 399
» Belief in Information Flow
Sort
View
IEEEVAST
2010
13 years 4 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
MVA
2010
229views Computer Vision» more  MVA 2010»
13 years 4 months ago
Robust 3D object registration without explicit correspondence using geometric integration
3D vision guided manipulation of components is a key problem of industrial machine vision. In this paper, we focus on the localization and pose estimation of known industrial objec...
Dirk Breitenreicher, Christoph Schnörr
DAC
2007
ACM
14 years 11 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
IMC
2005
ACM
14 years 3 months ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...
ER
1997
Springer
145views Database» more  ER 1997»
14 years 2 months ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli