Sciweavers

1084 search results - page 111 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
KDD
2012
ACM
194views Data Mining» more  KDD 2012»
13 years 6 months ago
A sparsity-inducing formulation for evolutionary co-clustering
Traditional co-clustering methods identify block structures from static data matrices. However, the data matrices in many applications are dynamic; that is, they evolve smoothly o...
Shuiwang Ji, Wenlu Zhang, Jun Liu
MVA
2007
173views Computer Vision» more  MVA 2007»
15 years 5 months ago
Microscopic Image Segmentation with Two-dimensional Exponential Entropy Based on Hybrid Microcanonical Annealing
Counting cells and following the evolution of the biological layers are important applications in microscopic imagery. In this paper, a microscopic image segmentation method with ...
Amir Nakib, Hamouche Oulhadj, Patrick Siarry
ITIIS
2010
129views more  ITIIS 2010»
14 years 11 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
PE
2011
Springer
167views Optimization» more  PE 2011»
14 years 11 months ago
Passage-time computation and aggregation strategies for large semi-Markov processes
High-level semi-Markov modelling paradigms such as semi-Markov stochastic Petri nets and process algebras are used to capture realistic performance models of computer and communic...
Marcel C. Guenther, Nicholas J. Dingle, Jeremy T. ...
ICPR
2006
IEEE
16 years 5 months ago
Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection
Recently, boosting is used widely in object detection applications because of its impressive performance in both speed and accuracy. However, learning weak classifiers which is on...
Duy-Dinh Le, Shin'ichi Satoh