Sciweavers

1702 search results - page 141 / 341
» Hidden Pattern Statistics
Sort
View
HAIS
2009
Springer
14 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
TOOLS
1998
IEEE
14 years 2 months ago
Declarative Reasoning about the Structure of Object-Oriented Systems
The structure of object-oriented systems typically forms a complicated, tangled web of interdependent classes. Understanding this implicit and hidden structure poses severe proble...
Roel Wuyts
CVPR
1997
IEEE
14 years 2 months ago
LAFTER: Lips and Face Real-Time Tracker
This paper describes an active-camera real-time system for tracking, shape description, and classification of the human face and mouth using only an SGI Indy computer. The system...
Nuria Oliver, Alex Pentland, François B&eac...
ICCE
2007
109views Education» more  ICCE 2007»
13 years 11 months ago
Information Sharing and Interaction in Collaborative Convergence
: In multiple research literatures, successful collaborative problem solving and learning is analyzed in terms of success of information sharing. In this paper we report analyses o...
Daniel D. Suthers, Ravikiran Vatrapu, Richard Medi...
IKE
2004
13 years 11 months ago
Analyzing Large Collections of Email
One of the first applications of the Internet was the electronic mailing (e-mail). Along with the evolution of the Internet, e-mail has evolved into a powerful and popular technolo...
Daniel A. Keim, Christian Panse, Jörn Schneid...