Sciweavers

6652 search results - page 1285 / 1331
» On the effective evaluation of TCP
Sort
View
IJCV
2008
223views more  IJCV 2008»
13 years 7 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele
BMCBI
2007
149views more  BMCBI 2007»
13 years 7 months ago
Robust imputation method for missing values in microarray data
Background: When analyzing microarray gene expression data, missing values are often encountered. Most multivariate statistical methods proposed for microarray data analysis canno...
Dankyu Yoon, Eun-Kyung Lee, Taesung Park
IJMMS
2008
62views more  IJMMS 2008»
13 years 7 months ago
Iterative design of MOVE: A situationally appropriate vehicle navigation system
Drivers need assistance when navigating an unfamiliar route. In-vehicle navigation systems have improved in recent years due to the technology advances, but are sometimes problema...
Joonhwan Lee, Jodi Forlizzi, Scott E. Hudson
CN
2007
146views more  CN 2007»
13 years 7 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 1285 / 1331 Last » Next »