Sciweavers

609 search results - page 120 / 122
» Comparing Similarity Combination Methods for Schema Matching
Sort
View
BMCBI
2005
167views more  BMCBI 2005»
13 years 8 months ago
Cross-platform analysis of cancer microarray data improves gene expression based classification of phenotypes
Background: The extensive use of DNA microarray technology in the characterization of the cell transcriptome is leading to an ever increasing amount of microarray data from cancer...
Patrick Warnat, Roland Eils, Benedikt Brors
ICIP
2003
IEEE
14 years 10 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
PR
2008
159views more  PR 2008»
13 years 8 months ago
A two-stage head pose estimation framework and evaluation
Head pose is an important indicator of a person's focus of attention. Also, head pose estimation can be used as the front-end analysis for multi-view face analysis. For examp...
Junwen Wu, Mohan M. Trivedi
3DPVT
2002
IEEE
150views Visualization» more  3DPVT 2002»
14 years 1 months ago
Implementation of a Shadow Carving System for Shape Capture
—We present a new technique for estimating the 3D shape of an object that combines previous ideas from shape from silhouettes and shape from shadows. We begin with a set-up for r...
Silvio Savarese, Holly E. Rushmeier, Fausto Bernar...