Browsing Conference Papers by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Conference Papers by Title

Sort by: Order: Results:

  • Al-Ani, Ban (CSREA Press (CD Rom), 2002)
  • Zhang, W; Lin, X; Cheema, MA; Zhang, Y; Wang, W (IEEE, 2010-01)
    K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over multi-valued objects. We aim to provide ...
  • Bernardo, DV; Chua, B; Hoang, DB (Research Publishing Services, 2009-01)
    This paper introduces a novel approach to a more practical Quantitative SRA. The approach formalized in this paper is based on the methods described in various risk assessment frameworks that were described by existing ...
  • Ying, M; Feng, Y; Yu, N (2013-01-29)
    Quantum cryptography has been extensively studied in the last twenty years, but information-flow security of quantum computing and communication systems has been almost untouched in the previous research. Duo to the essential ...
  • Liu, X; Li, J; Wang, L (Springer, 2008-01)
    Protein-protein interactions (PPIs) are one of the most important mechanisms in cellular processes. To model protein interaction sites, recent studies have suggested to find interacting protein group pairs from large PPI ...
  • Yang, C; Liu, C; Zhang, X; Nepal, S; Chen, J (2013)
    Nowadays, we enter a new era of data explosion which introduces the new problems for big data processing. Current methods for querying streaming XML big data are mostly based on events filtering techniques. It is well known ...
  • Serour, MK; Winder, D (Polytechnic University of Valencia, Spain, 2007-01)
    While there has been significant discussion of the techniques of method engineering, the current literature gives little attention to the adoption and diffusion process, firstly, how the organizations get ready for the ...
  • Agbinya, JI; Chaczko, ZC; Aboura, K (BroadBandCom '09, 2009-01)
    Electromagnetic Fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive mainly due to the scarcity of the data. We propose an architecture ...
  • Xie, B; Song, M; Mu, Y; Tao, D (Springer, 2010-01)
    Image retrieval on large-scale datasets is challenging. Current indexing schemes, such as k-d tree, suffer from the âcurse of dimensionalityâ . In addition, there is no principled approach to integrate various features ...
  • Tao, D; Tang, X (IEEE Computer Soc, 2004-01)
    Relevance feedback (RF) schemes based on support vector machine (SVM) have been widely used in content-based image retrieval. However, the performance of SVM based RF is often poor when the number of labeled positive ...
  • Shen, Yuzhong; Seevinck, Jennifer; Baydogan, Emre (IOS Press, 2006)
    Wound debridement refers to the removal of necrotic, devitalized, or contaminated tissue and/or foreign material to promote wound healing. Surgical debridement uses sharp instruments to cut dead tissue from a wound and it ...
  • Harbinson, D; Balsys, RJ; Suffern, KG (IEEE Computer Society, 2008-01)
  • Evans, R; Li, L; Mareels, I; Okello, N; Pham, MD; Qiu, W; Saleem, SK (IFAC, 2011-01)
    River basins are key components of water supply grids. River basin operators must handle a complex set of objectives including runoff storage, flood control, supply for consumptive use, hydroelectric power generation, ...
  • Paisitkriangkra, S; Shen, C; Zhang, J (Institute of Electrical and Electronics Engineers, 2008-01-01)
    Techniques for detecting pedestrian in still images have attached considerable research interests due to its wide applications such as video surveillance and intelligent transportation systems. In this paper, we propose a ...
  • Prade, H; Richard, G (2010)
    By logical proportion, we mean a statement that expresses a semantical equivalence between two pairs of propositions. In these pairs, each element is compared to the other in terms of similarities and/or dissimilarities. ...
  • Agbinya, JI; Lee, V; Aboura, K; Chaczko, ZC (BroadBandCom '09, 2009-01)
    Radio frequency spectrum mapping allows determining the radio frequency signatures prevalent within an environment. We address the primary frequency bands used for cellular, wireless LAN, UMTS and ultra wideband communications. ...
  • Lu, J; Shambour, Q; Zhang, G (2009)
    One of the new directions in current e-government development is to provide personalized online services to citizens and businesses. Recommendation techniques can bring a possible solution for this issue. This study proposes ...
  • Sarosa, S; Zowghi, D (Information Institute, 2005-01)
    to meet their original aims and objectives. In these circumstances, the project sponsors are forced to decide whether they should abandon the system they have paid for or improvise by finding a way around the problem. This ...
  • Dyson, LE; Litchfield, AJ; Raban, R; Tyler, JV (The University of Auckland, Auckland University of Technology, and Australasian Society for Computer, 2009-01)
    This paper seeks to address a major deficit in understandings of mobile learning, that is, its lack of a solid theoretical foundation. An overview of existing theoretical concepts of mobile learning is presented, followed ...
  • Lopez, M; Whalley, J; Robbins, P; Lister, RF (Association of Computing Machinery, 2008-01)
    ABSTRACT: This study analyzed student responses to an examination, after the students had completed one semester of instruction in programming. The performance of students on code tracing tasks correlated with their ...