Sciweavers

3707 search results - page 564 / 742
» Clustering by Pattern Similarity
Sort
View
PR
2007
143views more  PR 2007»
15 years 4 months ago
Shadow resistant tracking using inertia constraints
In this paper, we present a new method for tracking objects with shadows. Traditional motion-based tracking schemes cannot usually distinguish the shadow from the object itself, a...
Hao Jiang, Mark S. Drew
JOCN
2010
129views more  JOCN 2010»
15 years 3 months ago
Arabic Morphology in the Neural Language System
■ There are two views about morphology, the aspect of language concerned with the internal structure of words. One view holds that morphology is a domain of knowledge with a spe...
Sami Boudelaa, Friedemann Pulvermüller, Olaf ...
MMMACNS
2010
Springer
15 years 3 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 3 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
BMCBI
2011
14 years 11 months ago
Multivariate analysis of microarray data: differential expression and differential connection
Background: Typical analysis of microarray data ignores the correlation between gene expression values. In this paper we present a model for microarray data which specifically all...
Harri T. Kiiveri