Sciweavers

28888 search results - page 5442 / 5778
» Computability and complexity in analysis
Sort
View
CVPR
2009
IEEE
15 years 8 months ago
ImageNet: A large-scale hierarchical image database
The explosion of image data on the Internet has the potential to foster more sophisticated and robust models and algorithms to index, retrieve, organize and interact with images a...
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai...
ICDCS
2007
IEEE
15 years 8 months ago
uSense: A Unified Asymmetric Sensing Coverage Architecture for Wireless Sensor Networks
As a key approach to achieve energy efficiency in sensor networks, sensing coverage has been studied extensively. Researchers have designed many coverage protocols to provide vario...
Yu Gu, Joengmin Hwang, Tian He, David Hung-Chang D...
AINA
2004
IEEE
15 years 8 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
CSB
2004
IEEE
177views Bioinformatics» more  CSB 2004»
15 years 8 months ago
High-Throughput 3D Structural Homology Detection via NMR Resonance Assignment
One goal of the structural genomics initiative is the identification of new protein folds. Sequence-based structural homology prediction methods are an important means for priorit...
Christopher James Langmead, Bruce Randall Donald
CCS
2006
ACM
15 years 8 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
« Prev « First page 5442 / 5778 Last » Next »