Sciweavers

11212 search results - page 2210 / 2243
» Semi-persistent Data Structures
Sort
View
EIT
2008
IEEE
14 years 5 months ago
Taming XML: Objects first, then markup
Abstract—Processing markup in object-oriented languages often requires the programmer to focus on the objects generating the markup rather than the more pertinent domain objects....
Matt Bone, Peter F. Nabicht, Konstantin Läufe...
FGR
2008
IEEE
153views Biometrics» more  FGR 2008»
14 years 5 months ago
Facial image analysis using local feature adaptation prior to learning
Many facial image analysis methods rely on learningbased techniques such as Adaboost or SVMs to project classifiers based on the selection of local image filters (e.g., Haar and...
Rogerio Feris, Ying-li Tian, Yun Zhai, Arun Hampap...
ICSM
2008
IEEE
14 years 5 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
INFOCOM
2008
IEEE
14 years 5 months ago
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually...
Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang
INFOCOM
2008
IEEE
14 years 5 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
« Prev « First page 2210 / 2243 Last » Next »