Sciweavers

466 search results - page 73 / 94
» Textual Similarities Based on a Distributional Approach
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
MM
2005
ACM
178views Multimedia» more  MM 2005»
14 years 1 months ago
Attention region selection with information from professional digital camera
The attentive region extraction is a challenging issue for semantic interpretation of image and video content. The successful attentive region extraction greatly facilitates image...
Song Liu, Liang-Tien Chia, Deepu Rajan
MICCAI
2008
Springer
14 years 8 months ago
Segmenting Brain Tumors Using Pseudo-Conditional Random Fields
Locating Brain tumor segmentation within MR (magnetic resonance) images is integral to the treatment of brain cancer. This segmentation task requires classifying each voxel as eith...
Chi-Hoon Lee, Shaojun Wang, Albert Murtha, Matt...
AUTONOMICS
2009
ACM
14 years 2 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
ADMA
2006
Springer
150views Data Mining» more  ADMA 2006»
14 years 1 months ago
Web Scale Competitor Discovery Using Mutual Information
Abstract. The web with its rapid expansion has become an excellent resource for gathering information and people’s opinion. A company owner wants to know who is the competitor, a...
Rui Li, Shenghua Bao, Jin Wang, Yuanjie Liu, Yong ...