Sciweavers

2421 search results - page 14 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ECAI
2008
Springer
14 years 21 days ago
Determining Automatically the Size of Learned Ontologies
Determining the size of an ontology that is automatically learned from texts is an open issue. In this paper, we study the similarity between ontology concepts at different levels ...
Elias Zavitsanos, Sergios Petridis, Georgios Palio...
ICASSP
2011
IEEE
13 years 2 months ago
An adaptive bayesian clustering and multivariate region merging based technique for efficient segmentation of color images
We propose a methodology for improved segmentation of images in a Bayesian framework by fusion of color, texture and gradient information. The proposed algorithm is initialized by...
Sreenath Rao Vantaram, Eli Saber
ADC
2008
Springer
114views Database» more  ADC 2008»
14 years 28 days ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
JNW
2007
88views more  JNW 2007»
13 years 10 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
HPCC
2007
Springer
14 years 5 months ago
Hybrid Line Search for Multiobjective Optimization
Abstract. The aggregation of objectives in multiple criteria programming is one of the simplest and widely used approach. But it is well known that these techniques sometimes fail ...
Crina Grosan, Ajith Abraham