Sciweavers

2801 search results - page 134 / 561
» On the Adequateness of the Connection Method
Sort
View
143
Voted
EMMCVPR
2001
Springer
15 years 9 months ago
Path Based Pairwise Data Clustering with Application to Texture Segmentation
Most cost function based clustering or partitioning methods measure the compactness of groups of data. In contrast to this picture of a point source in feature space, some data sou...
Bernd Fischer, Thomas Zöller, Joachim M. Buhm...
ICEIS
2000
IEEE
15 years 9 months ago
Syntax-Directed Translation Schemes for Multi-Agent Systems Conversation Modelling
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
Ana L. N. Fred, Joaquim Filipe
154
Voted
ISD
1999
Springer
213views Database» more  ISD 1999»
15 years 9 months ago
A Probabilistic Approach to Environmental Change Detection with Area-Class Map Data
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...
ADBIS
2007
Springer
256views Database» more  ADBIS 2007»
15 years 8 months ago
Adaptive k-Nearest-Neighbor Classification Using a Dynamic Number of Nearest Neighbors
Classification based on k-nearest neighbors (kNN classification) is one of the most widely used classification methods. The number k of nearest neighbors used for achieving a high ...
Stefanos Ougiaroglou, Alexandros Nanopoulos, Apost...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 8 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...