Sciweavers

2006 search results - page 280 / 402
» Heuristic Security-Testing Methods
Sort
View
AI
1998
Springer
14 years 1 months ago
ELEM2: A Learning System for More Accurate Classifications
We present ELEM2, a new method for inducing classification rules from a set of examples. The method employs several new strategies in the induction and classification processes to ...
Aijun An, Nick Cercone
HPCN
1998
Springer
14 years 1 months ago
A Barotropic Global Ocean Model and its Parallel Implementation on Unstructured Grids
Unstructured grids can represent the complex geometry of the ocean basin with high delity. The lack of development tools supporting irregular grid problems discourages the use of ...
Hakan Öksüzoglu, A. G. M. van Hees
MICCAI
1998
Springer
14 years 1 months ago
Robust Brain Segmentation Using Histogram Scale-Space Analysis and Mathematical Morphology
Abstract. In this paper, we propose a robust fully non-supervised method dedicated to the segmentation of the brain in T1-weighted MR images. The first step consists in the analysi...
Jean-Francois Mangin, Olivier Coulon, Vincent Frou...
ASPDAC
2007
ACM
136views Hardware» more  ASPDAC 2007»
14 years 1 months ago
A Fast and Stable Algorithm for Obstacle-Avoiding Rectilinear Steiner Minimal Tree Construction
- In routing, finding a rectilinear Steiner minimal tree (RSMT) is a fundamental problem. Today's design often contains rectilinear obstacles, like macro cells, IP blocks, and...
Pei-Ci Wu, Jhih-Rong Gao, Ting-Chi Wang
IEEESCC
2010
IEEE
14 years 1 months ago
Dynamic Composition of Services in Sensor Networks
Abstract—Service modeling and composition is a fundamental method for offering advanced functionality by combining a set of primitive services provided by the system. Unlike in t...
Sahin Cem Geyik, Boleslaw K. Szymanski, Petros Zer...