Sciweavers

959 search results - page 28 / 192
» Possible and Necessary h-Indices
Sort
View
ISSA
2004
13 years 10 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
MVA
1994
100views Computer Vision» more  MVA 1994»
13 years 10 months ago
Image Analysis for Automated Pavement Cracking Evaluation
Image processing technology plays an important part in the analysis and evaluation of pavement surface cracking. The pattern recognition method for crack geometry proposed in this...
Hideki Shimamura, Kazuhiro Oonuma, Yoshizumi Yasud...
CORR
2010
Springer
45views Education» more  CORR 2010»
13 years 9 months ago
Solution to the Counterfeit Coin Problem and its Generalization
: This work deals with a classic problem: "Given a set of coins among which there is a counterfeit coin of a different weight, find this counterfeit coin using ordinary balanc...
Juan Dominguez-Montes
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 9 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby
FUIN
2006
95views more  FUIN 2006»
13 years 8 months ago
Bounds for Validation
In this paper we derive the bounds for Validation (known also as Hold-Out Estimate and Train-and-Test Method). We present the best possible bound in the case of 0-1 valued loss fun...
Wojciech Jaworski