Sciweavers

557 search results - page 41 / 112
» The L4.verified Project - Next Steps
Sort
View
ICB
2009
Springer
140views Biometrics» more  ICB 2009»
14 years 3 months ago
A Discriminant Analysis Method for Face Recognition in Heteroscedastic Distributions
Linear discriminant analysis (LDA) is a popular method in pattern recognition and is equivalent to Bayesian method when the sample distributions of different classes are obey to t...
Zhen Lei, ShengCai Liao, Dong Yi, Rui Qin, Stan Z....
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
14 years 3 months ago
Three Case Studies of Large-Scale Data Flows
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 1 months ago
EasyWinWin: Managing Complexity in Requirements Negotiation with GSS
More than ¾ of large software projects suffer large cost and schedule overruns or fail outright. Deficits in project requirements cause more than half of these failures and overr...
Robert O. Briggs, Paul Grünbacher
MICCAI
2001
Springer
14 years 1 months ago
Volume Rendering of Segmented Tubular Objects
This paper describes a new method of combining ray casting with segmented tubular objects, such as blood vessels, for purposes of clinically useful display. The method first projec...
Elizabeth Bullitt, Stephen R. Aylward
WWW
2006
ACM
14 years 9 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison