Sciweavers

10457 search results - page 1917 / 2092
» Data Mapping as Search
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 4 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
JDCTA
2008
117views more  JDCTA 2008»
15 years 4 months ago
Efficiency Enhancement of Neural Network with Phase Only Correlation
The research work is carried out to enhance the recognition accuracy of neural network with Phase Only Correlation (POC) and reduce the time required for POC by refining its input...
Usman Qayyum
ISI
2006
Springer
15 years 4 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
164
Voted
JMLR
2008
209views more  JMLR 2008»
15 years 4 months ago
Bayesian Inference and Optimal Design for the Sparse Linear Model
The linear model with sparsity-favouring prior on the coefficients has important applications in many different domains. In machine learning, most methods to date search for maxim...
Matthias W. Seeger
129
Voted
JNW
2008
171views more  JNW 2008»
15 years 4 months ago
The Necessity of Semantic Technologies in Grid Discovery
Service discovery and its automation are some of the key features that a large scale, open distributed system must provide so that clients and users may take advantage of shared re...
Serena Pastore
« Prev « First page 1917 / 2092 Last » Next »