Sciweavers

3918 search results - page 528 / 784
» Probabilistic model of triangulation
Sort
View
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 9 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
CVPR
2008
IEEE
15 years 9 months ago
General Constraints for Batch Multiple-Target Tracking Applied to Large-Scale Videomicroscopy
While there is a large class of Multiple-Target Tracking (MTT) problems for which batch processing is possible and desirable, batch MTT remains relatively unexplored in comparis...
Kevin Smith, Alan Carleton, Vincent Lepetit
120
Voted
ESORICS
2004
Springer
15 years 9 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
142
Voted
GECCO
2004
Springer
15 years 9 months ago
Real-Coded Bayesian Optimization Algorithm: Bringing the Strength of BOA into the Continuous World
This paper describes a continuous estimation of distribution algorithm (EDA) to solve decomposable, real-valued optimization problems quickly, accurately, and reliably. This is the...
Chang Wook Ahn, Rudrapatna S. Ramakrishna, David E...
DL
1999
Springer
139views Digital Library» more  DL 1999»
15 years 8 months ago
Constructing Web Views from Automated Navigation Sessions
Existing web search engines provide users with the ability to query an off-line database of indices in order to decide on an entry point for further manual navigation. Results are...
Nadav Zin, Mark Levene