Sciweavers

649 search results - page 83 / 130
» State estimation of the three-tank system using a multiple m...
Sort
View
BROADNETS
2005
IEEE
14 years 1 months ago
Network selection using fuzzy logic
—The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterize...
Shubha Kher, Arun K. Somani, Rohit Gupta
CVPR
2012
IEEE
11 years 10 months ago
The use of on-line co-training to reduce the training set size in pattern recognition methods: Application to left ventricle seg
The use of statistical pattern recognition models to segment the left ventricle of the heart in ultrasound images has gained substantial attention over the last few years. The mai...
Gustavo Carneiro, Jacinto C. Nascimento
CISS
2007
IEEE
14 years 2 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
DKE
2011
251views Education» more  DKE 2011»
13 years 2 months ago
Generating operation specifications from UML class diagrams: A model transformation approach
One of the more tedious and complex tasks during the specification of conceptual schemas (CSs) is modeling the operations that define the system behavior. This paper aims to simpl...
Manoli Albert, Jordi Cabot, Cristina Gómez,...
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
13 years 11 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick