Sciweavers

1404 search results - page 215 / 281
» Complexity of admissible rules
Sort
View
ICDAR
2009
IEEE
14 years 3 months ago
A Collaborative Interface for Multimodal Ink and Audio Documents
With the increased availability of pen-based devices, it becomes interesting to conduct and to archive multi-party communication sessions that involve audio and digital ink on a s...
Amit Regmi, Stephen M. Watt
IEEEIAS
2009
IEEE
14 years 3 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IOLTS
2009
IEEE
174views Hardware» more  IOLTS 2009»
14 years 3 months ago
ATPG-based grading of strong fault-secureness
—Robust circuit design has become a major concern for nanoscale technologies. As a consequence, for design validation, not only the functionality of a circuit has to be considere...
Marc Hunger, Sybille Hellebrand, Alejandro Czutro,...
COSIT
2009
Springer
179views GIS» more  COSIT 2009»
14 years 3 months ago
An Algebraic Approach to Image Schemas for Geographic Space
Formal models of geographic space should support reasoning about its static and dynamic properties, its objects, their behaviors, and the relationships between them. Image schemas,...
Lisa Walton, Michael F. Worboys
EMMCVPR
2009
Springer
14 years 3 months ago
Boundaries as Contours of Optimal Appearance and Area of Support
7th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, Bonn, Germany, August 24-27, 2009 Bayesian boundary models often assume tha...
Christina Pavlopoulou, Stella X. Yu