|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5009 occurrences of 2572 keywords
|
|
|
Results
Found 8232 publication records. Showing 8232 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Benoit Donnet, Bruno Baynat, Timur Friedman |
Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives. |
CoNEXT |
2006 |
DBLP DOI BibTeX RDF |
bit clearing, measurement, bloom filters, false positives, traceroute, false negatives |
68 | Tyne Liang, Suh-Yin Lee, Wei-Pang Yang |
False hits of tri-syllabic queries in a Chinese signature file. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
trisyllabic query false hits, Chinese signature file, superimposed coding method, character-based Chinese text retrieval, multisyllabic query, multicharacter query, random false hit, irrelevant characters, document signature, adjacency false hit, character sequence information, proper nouns, Chinese names, character hashing method, bigram, optimal weight assignment, query processing, optical character recognition, database theory, document image processing, visual databases |
68 | Eugene Goldberg, Alexander Saldanha |
Timing Analysis with Implicitly Specified False Paths. |
VLSI Design |
2000 |
DBLP DOI BibTeX RDF |
known false paths, implicit false path representation, timing analysis, breadth-first search |
68 | Ronald Joe Stanley, Sanjeev Agarwal, Satish Somanchi |
The impact of false alarm mitigation on surface landmine detection in MWIR imagery. |
Pattern Anal. Appl. |
2004 |
DBLP DOI BibTeX RDF |
Airborne, Circular harmonics, False alarm mitigation, Landmine, RX, Image Processing, Transform |
68 | Alan Su 0002, Yu-Chin Hsu, Ta-Yung Liu, Mike Tien-Chien Lee |
Eliminating false loops caused by sharing in control path. |
ACM Trans. Design Autom. Electr. Syst. |
1998 |
DBLP DOI BibTeX RDF |
control path, false loop |
68 | Alan Su 0002, Ta-Yung Liu, Yu-Chin Hsu, Mike Tien-Chien Lee |
Eliminating False Loops Caused by Sharing in Control Path. |
ISSS |
1996 |
DBLP DOI BibTeX RDF |
false loops, control path sharing, timing validation, design sign-off phase, data path sharing, control logic sharing, removal algorithm, computation complexity, high level synthesis, high level synthesis, filter, resource sharing, logic minimization |
64 | Olivier Coudert |
An efficient algorithm to verify generalized false paths. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
co-sensitization, generalized false path, timing exception, formal verification, correctness, SAT, sensitization, false path, SDC |
63 | David Hung-Chang Du, S. H. Yen, Subbarao Ghanta |
On the General False Path Problem in Timing Analysis. |
DAC |
1989 |
DBLP DOI BibTeX RDF |
Graph Theory, Timing Analysis, Logic Simulation, VLSI circuit, Timing Verification, False path |
59 | Longfei Shi, XueSong Wang 0003, Shunping Xiao |
Polarization discrimination between repeater false-target and radar target. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
repeater false-target, discrimination, polarization |
55 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
55 | S. Mathieu-Marni, Shyam Kuttikkad, Rama Chellappa |
Context-Aided False Alarm Reduction for SAR Automatic Target Recognition. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
target pixels, context-aided false alarm reduction, high-resolution airborne SAR, constant false alarm rate, CFAR detection, 2D site model, multipass imagery, clutter discrimination, intensity features, target recognition algorithms, image registration, shape, synthetic aperture radar, synthetic aperture radar, size, automatic target recognition, radar image |
55 | Rajesh Elara Mohan, Wijerupage Sardha Wijesoma, Carlos Antonio Acosta Calderon, Changjiu Zhou |
Experimenting False Alarm Demand for Human Robot Interactions in Humanoid Soccer Robots. |
Int. J. Soc. Robotics |
2009 |
DBLP DOI BibTeX RDF |
Human robot teams, Robot performance, False alarm demand, Humanoid soccer robots, Autonomy modes |
55 | Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, Yuko Sakurai |
Characterizing false-name-proof allocation rules in combinatorial auctions. |
AAMAS (1) |
2009 |
DBLP BibTeX RDF |
false-name-proof, mechanism design, combinatorial auctions |
55 | Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanujam, Prithviraj Banerjee |
Reducing False Sharing and Improving Spatial Locality in a Unified Compilation Framework. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
loop and memory layout transformations, shared-memory multiprocessors, Data reuse, cache locality, false sharing |
55 | Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanujam, Prithviraj Banerjee |
On Reducing False Sharing while Improving Locality on Shared Memory Multiprocessors. |
IEEE PACT |
1999 |
DBLP DOI BibTeX RDF |
loop and memory layout transformations, shared-memory multiprocessors, data reuse, cache locality, false sharing |
50 | Kenji Terada, Makoto Yokoo |
False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
false-name-proof, multi-unit auction, mechanism design |
50 | Marwan A. Gharaybeh, Vishwani D. Agrawal, Michael L. Bushnell, Carlos G. Parodi |
False-Path Removal Using Delay Fault Simulation. |
J. Electron. Test. |
2000 |
DBLP DOI BibTeX RDF |
design for testability, fault simulation, Delay testing, path delay faults, synthesis for testability, redundancy removal |
50 | David T. Blaauw, Rajendran Panda, Abhijit Das |
Removing user specified false paths from timing graphs. |
DAC |
2000 |
DBLP DOI BibTeX RDF |
|
50 | Yuji Kukimoto, Robert K. Brayton |
Timing-safe false path removal for combinational modules. |
ICCAD |
1999 |
DBLP DOI BibTeX RDF |
|
49 | Hae Young Lee, Tae Ho Cho |
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
false data injection attacks, false data filtering, security, Wireless sensor networks, fuzzy logic |
48 | Melissa Tjiong, Johan Lukkien |
On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. |
AINA |
2009 |
DBLP DOI BibTeX RDF |
consistency, false-positive, false-negative, soft-state |
46 | Sheng Li, Mingxi Wan, Supin Wang |
The Effects of the False Vocal Fold Gaps in a Model of the Larynx on Pressures Distributions and Flows. |
HCI (12) |
2007 |
DBLP DOI BibTeX RDF |
false vocal folds, pressure distributions, model, Speech production |
46 | Kuang-Chih Liu, Chung-Ta King |
On the effectiveness of sectored caches in reducing false sharing misses. |
ICPADS |
1997 |
DBLP DOI BibTeX RDF |
sectored caches, false sharing misses, bus-based multiprocessors, coherence unit, MESI protocol, LU, SORBYR, SORBYC, benchmarks, FFT, performance metric, cache storage, Radix |
45 | Ruslan Mitkov, Viktor Pekar 0001, Dimitar Blagoev, Andrea Mulloni |
Methods for extracting and classifying pairs of cognates and false friends. |
Mach. Transl. |
2007 |
DBLP DOI BibTeX RDF |
Cognates, Faux amis, Orthographic similarity, Distributonal similarity, Translational equivalence, Semantic similarity |
45 | Hae Young Lee, Tae Ho Cho |
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. |
ICDCIT |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Zhihong Chong, Jeffrey Xu Yu, Hongjun Lu, Zhengjie Zhang, Aoying Zhou |
False-Negative Frequent Items Mining from Data Streams with Bursting. |
DASFAA |
2005 |
DBLP DOI BibTeX RDF |
|
45 | R. Iris Bahar, Hyunwoo Cho, Gary D. Hachtel, Enrico Macii, Fabio Somenzi |
Symbolic timing analysis and resynthesis for low power of combinational circuits containing false paths. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1997 |
DBLP DOI BibTeX RDF |
|
44 | Sang Jin Lee, Hae Young Lee, Tae Ho Cho |
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
false data filtering, false data injection attacks, security, wireless sensor networks, fuzzy system |
44 | Nan Tang 0001, Jeffrey Xu Yu, Kam-Fai Wong, Haifeng Jiang |
Fast Structural Join with a Location Function. |
DASFAA |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Shan-Hung Wu, Keng-Pei Lin, Chung-Min Chen, Ming-Syan Chen |
Asymmetric support vector machines: low false-positive learning under the user tolerance. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
low false-positive learning, support vectormachine (svm), classification |
41 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning |
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. |
ACM Trans. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
filtering false data, interleaved hop-by-hop, sensor networks, Authentication |
41 | Riyad Alshammari, Sumalee Sonamthiang, Mohsen Teimouri, Denis Riordan |
Using Neuro-Fuzzy Approach to Reduce False Positive Alerts. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
Security, Classification, Intrusion Detection, False Positive, Neuro- Fuzzy |
41 | Jongwoo Lee, Young-Ho Park 0002, Yongik Yoon 0001 |
SCSTallocator: Sized and Call-Site Tracing-Based Shared Memory Allocator for False Sharing Reduction in Page-Based DSM Systems. |
IDEAL |
2007 |
DBLP DOI BibTeX RDF |
Sized Allocation, Call Site Tracing, Distributed Shared Memory, Dynamic Memory Allocation, False Sharing |
41 | Yuichi Sei, Shinichi Honiden |
Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. |
OTM Conferences (1) |
2007 |
DBLP DOI BibTeX RDF |
false event, security, wireless sensor network, node compromise, en-route filtering |
41 | Jongwoo Lee, Sung Dong Kim, Jae Won Lee, Jangmin O |
CSTallocator: Call-Site Tracing Based Shared Memory Allocator for False Sharing Reduction in Page-Based DSM Systems. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
Call Site Tracing, Distributed Shared Memory, Dynamic Memory Allocation, False Sharing |
41 | Jyh-Herng Chow, Vivek Sarkar |
False Sharing Elimination by Selection of Runtime Scheduling Parameters. |
ICPP |
1997 |
DBLP DOI BibTeX RDF |
runtime scheduling, compilers, shared-memory multiprocessors, parallel loops, false sharing |
41 | Murali Kadiyala, Laxmi N. Bhuyan |
A dynamic cache sub-block design to reduce false sharing. |
ICCD |
1995 |
DBLP DOI BibTeX RDF |
dynamic cache sub-block design, bus traffic, dynamic sub-block coherence protocol, simulation results, memory architecture, cache storage, false sharing, memory protocols |
41 | Yungbum Jung, Jaehwang Kim, Jaeho Shin 0001, Kwangkeun Yi |
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis. |
SAS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Sandeep Mane, Jaideep Srivastava, San-Yih Hwang, Jamshid A. Vayghan |
Estimation of False Negatives in Classification. |
ICDM |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Jamie Sherrah |
False Alarm Rate: a Critical Performance Measure for Face Recognition. |
FGR |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Aditya Akella, Srinivasan Seshan, Hari Balakrishnan |
The Impact of False Sharing on Shared Congestion Management. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Aditya Akella, Srinivasan Seshan |
The impact of false sharing on shared congestion management. |
Comput. Commun. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Hongjie He, Jiashu Zhang, Fan Chen 0003 |
A self-recovery fragile watermarking scheme for image authentication with superior localization. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
tamper recovery, probability of false rejection, probability of false acceptance, digital watermarking |
40 | John Daugman |
High Confidence Visual Recognition of Persons by a Test of Statistical Independence. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1993 |
DBLP DOI BibTeX RDF |
personal identity recognition, statistical independence test, rapid visual recognition, phenotypic feature, multiscale quadrature 2-D Gabor wavelet coefficients, iris code, statistical decision theory, false accept error rates, false reject error rates, decision confidence levels, feature extraction, face recognition, face recognition, probability, statistical analysis, image coding, decision theory, image texture, exclusive-OR |
40 | Amit Adam, Ehud Rivlin, Ilan Shimshoni |
ROR: Rejection of Outliers by Rotations. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2001 |
DBLP DOI BibTeX RDF |
false matches, outliers, robust estimation, feature matching, Correspondence problem, outlier rejection |
38 | Liu Zhen, Zhou Ming-Tian |
Spam Filtering Issue: FPD Research between False Positive and False Negative. |
FSKD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Guoren Wang, Ge Yu 0001, Junchang Xin, Yuhai Zhao, Ende Zhang |
Fast filtering false active subspaces for efficient high dimensional similarity processing. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
refining processing, false active subspace, high dimensional index |
37 | Ulrich Reffle, Annette Gotscharek, Christoph Ringlstetter, Klaus U. Schulz |
Successfully detecting and correcting false friends using channel profiles. |
AND |
2008 |
DBLP DOI BibTeX RDF |
error dictionaries, false friends, error correction |
37 | Murthy Palla, Jens Bargfrede, Klaus Koch, Walter Anheier, Rolf Drechsler |
Adaptive Branch and Bound Using SAT to Estimate False Crosstalk. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
Crosstalk Analysis, False Noise, STA, SAT Solver |
37 | Chan-Yun Yang, Wei-Wen Tseng, Jr-Syu Yang |
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Video-based Smoke detection, Pattern recognition, Support vector machines, False alarm, Margin |
37 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
37 | Gil-Han Kim, Hyung-Woo Lee |
SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM |
37 | Shlomo Hershkop, Salvatore J. Stolfo |
Combining email models for false positive reduction. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
email mining, false positive reduction, data mining, aggregators, spam, multiple classifiers, model combination |
37 | Stefanie Scheid, Rainer Spang |
A Stochastic Downhill Search Algorithm for Estimating the Local False Discovery Rate. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2004 |
DBLP DOI BibTeX RDF |
Local false discovery rates, stochastic search algorithms, biology and genetics, microarray analysis |
37 | Zheng Rong Yang, Weiping Lu, Dejin Yu, Robert G. Harrison |
Detecting False Benign in Breast Cancer Diagnosis. |
IJCNN (3) |
2000 |
DBLP DOI BibTeX RDF |
false benign, Wisconsin database, neural networks, breast cancer diagnosis |
37 | Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann |
Methods for Precise False-Overlap Detection in Tile-Based Rendering. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Moon Sun Shin, Eun Hee Kim, Keun Ho Ryu |
False Alarm Classification Model for Network-Based Intrusion Detection System. |
IDEAL |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Yuko Sakurai, Makoto Yokoo |
A false-name-proof double auction protocol for arbitrary evaluation values. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
electronic commerce, mechanism design, double auction |
37 | Kenji Terada, Makoto Yokoo |
False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values. |
PRIMA |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Yang Liu, Li Li |
Money Policy in Dynamic Stochastic General Equilibrium Models. |
CAR |
2009 |
DBLP DOI BibTeX RDF |
Money Policy, Dynamic Stochastic General Equilibrium Model, MIU Citation: Yang Liu, Li Li, Money Policy in Dynamic Stochastic General Equilibrium Models, pp.406-409, 2009 International Asia Conference on Informatics in Control, Automation and Robotics, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(Money Policy in Dynamic Stochastic General Equilibrium Models), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(1564), var pubYear = escape(2009), var volume = escape(0), var issueNo = escape(0), var packageTitle = escape(2009 International Asia Conference on Informatics in Control, Automation and Robotics), var productTitle = escape(Informatics in Control, Automation and Robotics, International Asia Conference on), var acronymTemp = escape(CAR), var bcPageName = escape(C), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/1564), var linkToIssue=escape(/plugins/dl/years/1564?year=2009&vol=0), var linkToTOC=escape(/plugins/dl/toc/6544), var linkToAbstract = escape(/plugins/dl/doi/10.1109/CAR.2009.103), var journalPage = escape(cc), var abbrevTitle = escape(car), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(Money Policy in Dynamic Stochastic General Equilibrium Models), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=60" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), car, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2) |
36 | Feifei Feng, Yongjun Wu, Chu Zhang, Yiming Wu |
Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer. |
ICNC (2) |
2009 |
DBLP DOI BibTeX RDF |
tumor marker, bronchofibroscope, lung cancer Citation: Feifei Feng, Yongjun Wu, Chu Zhang, Yiming Wu, Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer, icnc, vol. 2, pp.118-125, 2009 Fifth International Conference on Natural Computation, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(916), var pubYear = escape(2009), var volume = escape(2), var issueNo = escape(2), var packageTitle = escape(2009 Fifth International Conference on Natural Computation), var productTitle = escape(International Conference on Natural Computation), var acronymTemp = escape(ICNC), var bcPageName = escape(I), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/916), var linkToIssue=escape(/plugins/dl/years/916?year=2009&vol=2), var linkToTOC=escape(/plugins/dl/toc/7230), var linkToAbstract = escape(/plugins/dl/doi/10.1109/ICNC.2009.635), var journalPage = escape(i), var abbrevTitle = escape(icnc), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=61" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), Artificial neural networks, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2) |
36 | Sushama P. Patil, Amol C. Goje |
The Effect of Developments in Student Attributes on Success in Programming of Management Students. |
ICETC |
2009 |
DBLP DOI BibTeX RDF |
mathematical aptitude, performance consistence in mathematics etc Citation: Sushama P. Patil, Amol C. Goje, The Effect of Developments in Student Attributes on Success in Programming of Management Students, icetc, pp.191-193, 2009 International Conference on Education Technology and Computer, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(The Effect of Developments in Student Attributes on Success in Programming of Management Students), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(1629), var pubYear = escape(2009), var volume = escape(0), var issueNo = escape(0), var packageTitle = escape(2009 International Conference on Education Technology and Computer), var productTitle = escape(Education Technology and Computer, International Conference on), var acronymTemp = escape(ICETC), var bcPageName = escape(I), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/1629), var linkToIssue=escape(/plugins/dl/years/1629?year=2009&vol=0), var linkToTOC=escape(/plugins/dl/toc/6836), var linkToAbstract = escape(/plugins/dl/doi/10.1109/ICETC.2009.35), var journalPage = escape(i), var abbrevTitle = escape(icetc), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(The Effect of Developments in Student Attributes on Success in Programming of Management Students), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=62" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), spatial ability, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2) |
36 | Edson J. R. Justino, Abdenaim El Yacoubi, Flávio Bortolozzi, Robert Sabourin |
An Off-Line Signature Verification System using Hidden Markov Model and Cross-Validation. |
SIBGRAPI |
2000 |
DBLP DOI BibTeX RDF |
off-line signature verification system, pre-processing process, segmentation process, feature extraction process, random falsifications, false acceptance concept, false rejection concept, intrapersonal variation, interpersonal variation, automatic decision threshold derivation, hidden Markov model, handwriting recognition, cross-validation, learning process |
36 | W. Eric L. Grimson, Daniel P. Huttenlocher |
On the Sensitivity of the Hough Transform for Object Recognition. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1990 |
DBLP DOI BibTeX RDF |
false peak likelihood bound, tessellation effects, pattern recognition, pattern recognition, object recognition, picture processing, picture processing, transforms, noise, occlusion, Hough transform, sensitivity, sensitivity, false positives, coordinate transformations, sensory data |
35 | Hyeon Myeong Choi, Tae Ho Cho |
Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic. |
ICIC (1) |
2009 |
DBLP DOI BibTeX RDF |
SEF, Injected false report attack, Filtering scheme, Wireless sensor networks, Fuzzy |
35 | Meng Su, Chih-Fang Wang, Wen-Chi Hou |
An approach of composing near optimal invalidation reports. |
Mobile Data Management |
2005 |
DBLP DOI BibTeX RDF |
false invalidation, reconnection pattern, mobile databases, invalidation report |
33 | Nuel Belnap |
Truth Values, Neither-true-nor-false, and Supervaluations. |
Stud Logica |
2009 |
DBLP DOI BibTeX RDF |
neither-true-nor-false, non-denoting terms, future tense, vagueness, paradoxes, truth values |
33 | Gildas Avoine, Aslan Tchamkerten |
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack |
33 | Shihheng Tsai, Chung-Yang Huang |
A false-path aware formal static timing analyzer considering simultaneous input transitions. |
DAC |
2009 |
DBLP DOI BibTeX RDF |
critical path selection, multiple input transitioning, formal method, static timing analysis, false path |
33 | Haris Aziz 0001, Mike Paterson |
False name manipulations in weighted voting games: splitting, merging and annexation. |
AAMAS (1) |
2009 |
DBLP BibTeX RDF |
Banzhaf index, Shapley-Shubik index, false-name manipulation, computational complexity, weighted voting games |
33 | Mahmoud Jazzar, Aman Bin Jantan |
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
False alerts, Security, Intrusion detection, Self organizing maps, Fuzzy cognitive maps |
33 | Gwanggil Jeon, Marco Anisetti, Kyoungjoon Park, Valerio Bellandi, Jechang Jeong |
Improvement of Moving Image Quality on AC-PDP by Rough Set Based Dynamic False Contour Reduction. |
RSFDGrC |
2007 |
DBLP DOI BibTeX RDF |
Plasma display panel (PDP), motion picture distortion, dynamic false contour (DFC), temporal artifact, gray scale, rough set theory |
33 | Shuo Zhou, Bo Yao, Hongyu Chen, Yi Zhu 0002, Chung-Kuan Cheng, Michael D. Hutton |
Efficient static timing analysis using a unified framework for false paths and multi-cycle paths. |
ASP-DAC |
2006 |
DBLP DOI BibTeX RDF |
biclique covering, false subgraphs, multi-cycle subgraphs, static timing analysis, time shifting |
33 | Takayuki Suyama, Makoto Yokoo |
Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction. |
Auton. Agents Multi Agent Syst. |
2005 |
DBLP DOI BibTeX RDF |
strategy/false-name proof, mechanism design, combinatorial auction, multi-attribute |
33 | Felipe S. Marques 0001, Renato P. Ribas, Sachin S. Sapatnekar, André Inácio Reis |
A new approach to the use of satisfiability in false path detection. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
unateness, satisfiability, false paths |
33 | Daniel P. Huttenlocher, Eric W. Jaquith |
Computing Visual Correspondence: Incorporating the Probability of a False Match. |
ICCV |
1995 |
DBLP DOI BibTeX RDF |
visual correspondence, false match, depth boundaries, uniform texture, poor quality, image segmentation, motion estimation, probability, probability, image sequences, similarity measure, optical flow, image matching, stereo image processing, stereo image processing, image texture, stereo disparity, motion boundaries |
32 | Oliver Hinz |
False Information in Internet Auction Communities. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Kai Yang, Kwang-Ting Cheng |
Efficient identification of multi-cycle false path. |
ASP-DAC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Makoto Shimamura, Kenji Kono |
Using Attack Information to Reduce False Positives in Network IDS. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | A. A. Abimbola, Jose Munoz, William J. Buchanan |
Investigating False Positive Reduction in HTTP via Procedure Analysis. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Wonseok Ahn, Jae-Seung Kim |
Flat-Region Detection and False Contour Removal in the Digital TV Display. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Atsushi Iwasaki, Makoto Yokoo, Kenji Terada |
A robust open ascending-price multi-unit auction protocol against false-name bids. |
EC |
2003 |
DBLP DOI BibTeX RDF |
|
32 | K. V. Manjunath, R. Govindarajan |
Hidden Costs in Avoiding False Sharing in Software DSMs. |
HiPC |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Tor E. Jeremiassen, Susan J. Eggers |
Reducing False Sharing on Shared Memory Multiprocessors through Compile Time Data Transformations. |
PPoPP |
1995 |
DBLP DOI BibTeX RDF |
|
31 | Miad Faezipour, Mehrdad Nourani, Rina Panigrahy |
A hardware platform for efficient worm outbreak detection. |
ACM Trans. Design Autom. Electr. Syst. |
2009 |
DBLP DOI BibTeX RDF |
shared counters, worm outbreak, hashing, false positive, Network Intrusion Detection System, false negative, polymorphic worm |
31 | Soo Young Moon, Tae Ho Cho |
Energy efficient filtering method in sensor networks. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
SEF, false report injection, wireless sensor networks, security attacks |
31 | Pars Mutaf, Claude Castelluccia |
Hash-Based Paging and Location Update Using Bloom Filters. |
Mob. Networks Appl. |
2004 |
DBLP DOI BibTeX RDF |
concurrent paging, false location update, bloom filters, MIPv6, IP paging |
31 | Stefan Axelsson |
The base-rate fallacy and the difficulty of intrusion detection. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
base-rate fallacy, intrusion detection, false alarm rate, detection rate |
31 | Leonardo W. Estevez, Nasser Kehtarnavaz |
Computer Assisted Enhancement of Mammograms for Detection of Microcalcifications. |
CBMS |
1995 |
DBLP DOI BibTeX RDF |
computer-assisted mammogram enhancement, microcalcification detection, visual identification, false positive samples, general-purpose clustering algorithm, Issac, Interactive Selective and Adaptive Clustering, selective clustering, interactive adaptation, sensitive sample domains, clinical evaluation, routine reading session, generalization, interactive systems, object detection, medical image processing, sensitivity, breast cancer, generalisation (artificial intelligence), radiology, radiology |
31 | Janne J. Lehtomäki, Johanna Vartiainen, Markku J. Juntti, Harri Saarnisaari |
CFAR Outlier Detection With Forward Methods. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Tossapon Boongoen, Qiang Shen 0001 |
Intelligent hybrid approach to false identity detection. |
ICAIL |
2009 |
DBLP DOI BibTeX RDF |
false identity detection, terrorist data, link analysis, hybrid algorithm |
28 | Xiaoxiao Liu, Guangsheng Ma, Qiang Sun |
An Advanced Timing Characterization Method Considering Global False Path. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
functional (mode) dependency, timing analysis, false path, Circuit delay |
28 | Jing-Jia Liou, Angela Krstic, Li-C. Wang, Kwang-Ting Cheng |
False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
critical path selection, statistical timing analysis, false path |
28 | Bong-Su Kang, Sung-Il Chien, Kil-Taek Lim, Jin-Ho Kim |
Large Scale Pattern Recognition System using Hierarchical Neural Network and False-Alarming Nodes. |
ICTAI |
1997 |
DBLP DOI BibTeX RDF |
False-alarming node and Error-prone negative examples, Hierarchical neural network, Topology-preserving mapping |
28 | J. Mike McHugh, Janusz Konrad, Venkatesh Saligrama, Pierre-Marc Jodoin, David A. Castañón |
Motion detection with false discovery rate control. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Andrew Foss, Osmar R. Zaïane |
Estimating True and False Positive Rates in Higher Dimensional Problems and Its Data Mining Applications. |
ICDM Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Martin Dolejsi, Jan Kybic, Stanislav Tuma, Michal Polovincak |
Reducing false positive responses in lung nodule detector system by asymmetric adaboost. |
ISBI |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Makoto Yokoo |
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols. |
IAT |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Rafal Pokrywka |
Reducing False Alarm Rate in Anomaly Detection with Layered Filtering. |
ICCS (1) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Haruna Matsushita, Yoshifumi Nishio |
Batch-Learning Self-Organizing Map with false-neighbor degree between neurons. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 8232 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|