Sciweavers

3928 search results - page 182 / 786
» order 2006
Sort
View
INFFUS
2002
162views more  INFFUS 2002»
15 years 4 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
15 years 4 months ago
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...
Jaak Tepandi
INFSOF
2002
65views more  INFSOF 2002»
15 years 4 months ago
The documentary structure of source code
Many tools designed to help programmers view and manipulate source code exploit the formal structure of the programming language. Language-based tools use information derived via ...
Michael L. Van de Vanter
IS
2002
15 years 4 months ago
Signature-based structures for objects with set-valued attributes
Aiming at the efficient retrieval of objects with set-valued attributes, we introduce three variations of a new method in order to satisfy subset and superset queries. Our approac...
Eleni Tousidou, Panayiotis Bozanis, Yannis Manolop...
IVC
2002
192views more  IVC 2002»
15 years 4 months ago
Understanding visual behaviour
Modelling events is one of the key problems in dynamic scene analysis when salient and autonomous visual changes occuring in a scene need to be characterised effectively as meanin...
Shaogang Gong, Hilary Buxton