Sciweavers

155 search results - page 27 / 31
» Derivation of a Dialog Model from a Task Model by Activity C...
Sort
View
AICOM
2002
103views more  AICOM 2002»
13 years 10 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
ER
2010
Springer
114views Database» more  ER 2010»
13 years 9 months ago
KBB: A Knowledge-Bundle Builder for Research Studies
Researchers struggle to manage vast amounts of data coming from hundreds of sources in online repositories. To successfully conduct research studies, researchers need to find, ret...
David W. Embley, Stephen W. Liddle, Deryle W. Lons...
CN
2004
129views more  CN 2004»
13 years 10 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ECCV
2004
Springer
15 years 7 days ago
Dimensionality Reduction by Canonical Contextual Correlation Projections
A linear, discriminative, supervised technique for reducing feature vectors extracted from image data to a lower-dimensional representation is proposed. It is derived from classica...
Marco Loog, Bram van Ginneken, Robert P. W. Duin
CGF
2007
157views more  CGF 2007»
13 years 10 months ago
Mesh Segmentation via Spectral Embedding and Contour Analysis
We propose a mesh segmentation algorithm via recursive bisection where at each step, a sub-mesh embedded in 3D is first spectrally projected into the plane and then a contour is ...
Rong Liu, Hao Zhang 0002