Sciweavers

1678 search results - page 229 / 336
» Modeling Information Retrieval with Probabilistic Argumentat...
Sort
View
COMPSAC
2008
IEEE
14 years 3 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
AIPS
2003
13 years 10 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
13 years 6 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
AVSS
2008
IEEE
14 years 3 months ago
Person Tracking with Audio-Visual Cues Using the Iterative Decoding Framework
Tracking humans in an indoor environment is an essential part of surveillance systems. Vision based and microphone array based trackers have been extensively researched in the pas...
Shankar T. Shivappa, Mohan M. Trivedi, Bhaskar D. ...
BILDMED
2008
212views Algorithms» more  BILDMED 2008»
13 years 10 months ago
3D Blood Flow Reconstruction from 2D Angiograms
A method for 3-d blood flow reconstruction is presented. Given a 3-d volume of a vessel tree and a 2-d sequence of angiograms, the propagation information can be back-projected int...
Esther-Sabrina Platzer, Frank Deinzer, Dietrich Pa...