Sciweavers

3506 search results - page 697 / 702
» Pattern recognition in information systems
Sort
View
ROMAN
2007
IEEE
139views Robotics» more  ROMAN 2007»
14 years 2 months ago
Tele-operation of a Mobile Robot Using a Force Reflection Joystick with a Single Hall Sensor
—Though the final goal of mobile robot navigation is to be autonomous, operators’ intelligent and skillful decisions are necessary when there are many scattered obstacles. Ther...
Soonshin Han, JangMyung Lee
CCS
2007
ACM
14 years 2 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
MSR
2006
ACM
14 years 1 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
AINA
2005
IEEE
14 years 1 months ago
iHITS: Extending HITS for Personal Interests Profiling
Ever since the boom of World Wide Web, profiling online users' interests has become an important task for content providers. The traditional approach involves manual entry of...
Ziming Zhuang