Sciweavers

841 search results - page 43 / 169
» Implementing the Experience Factory concepts as a set of Exp...
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
DEXAW
1999
IEEE
103views Database» more  DEXAW 1999»
13 years 12 months ago
Applying Temporal Databases to Geographical Data Analysis
This paper reports an experience in which a temporal database was used to analyze the results of a survey on human behaviors and displacements in a ski resort. This survey was par...
Marie-Christine Fauvet, S. Chardonnel, Marlon Duma...
IJSWIS
2006
107views more  IJSWIS 2006»
13 years 7 months ago
Knowledge-Assisted Image Analysis Based on Context and Spatial Optimization
In this article, an approach to semantic image analysis is presented. Under the proposed approach, ontologiesareusedtocapturegeneral,spatial,andcontextualknowledgeofadomain,andage...
Georgios Th. Papadopoulos, Phivos Mylonas, Vasilei...
ISMAR
2007
IEEE
14 years 1 months ago
Real-Time Object Tracking for Augmented Reality Combining Graph Cuts and Optical Flow
We present an efficient and accurate object tracking algorithm based on the concept of graph cut segmentation. The ability to track visible objects in real-time provides an inval...
Jonathan Mooser, Suya You, Ulrich Neumann
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 7 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...