Sciweavers

923 search results - page 136 / 185
» On the Topology of Discrete Strategies
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
13 years 8 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
ICIP
2007
IEEE
14 years 10 months ago
Automatic Parametrisation for an Image Completion Method Based on Markov Random Fields
Recently, a new exemplar-based method for image completion, texture synthesis and image inpainting was proposed which uses a discrete global optimization strategy based on Markov ...
Huy Tho Ho, Roland Göcke
ICDE
2008
IEEE
146views Database» more  ICDE 2008»
14 years 10 months ago
Handling Uncertain Data in Array Database Systems
Scientific and intelligence applications have special data handling needs. In these settings, data does not fit the standard model of short coded records that had dominated the dat...
Tingjian Ge, Stanley B. Zdonik
CHI
2005
ACM
14 years 9 months ago
Toward subtle intimate interfaces for mobile devices using an EMG controller
Using a mobile device in a social context should not cause embarrassment and disruption to the immediate environment. Interaction with mobile and wearable devices needs to be subt...
Enrico Costanza, Samuel A. Inverso, Rebecca Allen
SDM
2009
SIAM
140views Data Mining» more  SDM 2009»
14 years 6 months ago
Straightforward Feature Selection for Scalable Latent Semantic Indexing.
Latent Semantic Indexing (LSI) has been validated to be effective on many small scale text collections. However, little evidence has shown its effectiveness on unsampled large sca...
Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen