Sciweavers

1592 search results - page 155 / 319
» The state of the email address
Sort
View
CVPR
1997
IEEE
14 years 3 months ago
The FERET Evaluation Methodology for Face-Recognition Algorithms
Two of the most critical requirementsin support of producing reliableface-recognition systems are a large database of facial images and a testing procedure to evaluate systems. Th...
P. Jonathon Phillips, Hyeonjoon Moon, Patrick J. R...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 3 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ISLPED
1996
ACM
101views Hardware» more  ISLPED 1996»
14 years 2 months ago
High-level power estimation
The growing demand for portable electronic devices has led to an increased emphasis on power consumption within the semiconductor industry. As a result, designers are now encourag...
Paul E. Landman
IFIP
1993
Springer
14 years 2 months ago
Computer-Aided Manufacturing System Engineering
A new type of computer-aided engineering environment is envisioned which will improve the productivity of manufacturing/industrial engineers. This environment would be used by eng...
C. R. McLean
AGP
2010
IEEE
14 years 2 months ago
The Transformational Approach to Program Development
We present an overview of the program transformation techniques which have been proposed over the past twenty-five years in the context of logic programming. We consider the appro...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...