Sciweavers

122 search results - page 24 / 25
» Crossed lines
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 6 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2009
ACM
258views Database» more  SIGMOD 2009»
14 years 5 months ago
Continuous obstructed nearest neighbor queries in spatial databases
In this paper, we study a novel form of continuous nearest neighbor queries in the presence of obstacles, namely continuous obstructed nearest neighbor (CONN) search. It considers...
Yunjun Gao, Baihua Zheng
CVPR
2010
IEEE
2187views Computer Vision» more  CVPR 2010»
14 years 1 months ago
3D Scene Priors for Road Detection
Vision-based road detection is important in different areas of computer vision such as autonomous driving, car collision warning and pedestrian crossing detection. However, curre...
Jose M. Alvarez, Theo Gevers, Antonio M. Lopez
EURONGI
2005
Springer
13 years 11 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
ICDM
2007
IEEE
148views Data Mining» more  ICDM 2007»
13 years 9 months ago
Sample Selection for Maximal Diversity
The problem of selecting a sample subset sufficient to preserve diversity arises in many applications. One example is in the design of recombinant inbred lines (RIL) for genetic a...
Feng Pan, Adam Roberts, Leonard McMillan, David Th...