Sciweavers

2056 search results - page 353 / 412
» time 2000
Sort
View
SIAMMAX
2010
145views more  SIAMMAX 2010»
13 years 4 months ago
Adaptive First-Order Methods for General Sparse Inverse Covariance Selection
In this paper, we consider estimating sparse inverse covariance of a Gaussian graphical model whose conditional independence is assumed to be partially known. Similarly as in [5],...
Zhaosong Lu
ISBI
2011
IEEE
13 years 1 months ago
Differential information content in staggered multiple shell hardi measured by the tensor distribution function
Diffusion tensor imaging has accelerated the study of brain connectivity, but single-tensor diffusion models are too simplistic to model fiber crossing and mixing. Hybrid diffusio...
Liang Zhan, Alex D. Leow, Iman Aganj, Christophe L...

Publication
163views
12 years 6 months ago
Saliency Maps of High Dynamic Range Images
A number of computational models of visual attention have been proposed based on the concept of saliency map. Some of them have been validated as predictors of the visual scan-path...
Roland Brémond, Josselin Petit and Jean-Philippe...
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
14 years 2 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
CCS
2007
ACM
14 years 4 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...