Sciweavers

544 search results - page 76 / 109
» On the Complexity of Loop Fusion
Sort
View
ICPR
2008
IEEE
14 years 3 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
CVPR
2007
IEEE
14 years 3 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon
AGILE
2007
Springer
127views GIS» more  AGILE 2007»
14 years 3 months ago
Space-contained conflict revision, for geographic information
Using qualitative reasoning with geographic information, contrarily, for instance, with robotics, looks not only fastidious (i.e.: encoding knowledge Propositional Logics PL), but ...
Omar Doukari, Robert Jeansoulin
CSB
2005
IEEE
206views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Bioinformatic Insights from Metagenomics through Visualization
Cutting-edge biological and bioinformatics research seeks a systems perspective through the analysis of multiple types of high-throughput and other experimental data for the same ...
Susan L. Havre, Bobbie-Jo M. Webb-Robertson, Anuj ...
DCOSS
2005
Springer
14 years 2 months ago
Routing Explicit Side Information for Data Compression in Wireless Sensor Networks
Abstract. Two difficulties in designing data-centric routes [2–5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computatio...
Huiyu Luo, Gregory J. Pottie