Sciweavers

2236 search results - page 416 / 448
» Intrusion detection techniques and approaches
Sort
View
JSS
2008
217views more  JSS 2008»
13 years 7 months ago
MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation
So far, many researches have been done to develop efficient music retrieval systems, and query-by-humming has been considered as one of the most intuitive and effective query meth...
Seungmin Rho, Byeong-jun Han, Eenjun Hwang, Minkoo...
TOG
2002
128views more  TOG 2002»
13 years 7 months ago
Modelling with implicit surfaces that interpolate
We introduce new techniques for modelling with interpolating implicit surfaces. This form of implicit surface was first used for problems of surface reconstruction [24] and shape ...
Greg Turk, James F. O'Brien
BMCBI
2010
216views more  BMCBI 2010»
13 years 2 months ago
Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies
Background: Nonparametric Bayesian techniques have been developed recently to extend the sophistication of factor models, allowing one to infer the number of appropriate factors f...
Bo Chen, Minhua Chen, John William Paisley, Aimee ...
CGF
2011
12 years 11 months ago
Intrinsic Shape Matching by Planned Landmark Sampling
Recently, the problem of intrinsic shape matching has received a lot of attention. A number of algorithms have been proposed, among which random-sampling-based techniques have bee...
Art Tevs, Alexander Berner, Michael Wand, Ivo Ihrk...
DAC
2007
ACM
14 years 8 months ago
Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop
This paper presents a variation resilient circuit design technique for maintaining parametric yield of design under inherent variation in process parameters. We propose to utilize...
Kunhyuk Kang, Kee-Jong Kim, Kaushik Roy