Sciweavers

82 search results - page 16 / 17
» Principled Sampling for Anomaly Detection
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 6 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 9 days ago
A Local Scalable Distributed Expectation Maximization Algorithm for Large Peer-to-Peer Networks
This paper offers a local distributed algorithm for expectation maximization in large peer-to-peer environments. The algorithm can be used for a variety of well-known data mining...
Kanishka Bhaduri, Ashok N. Srivastava
ICIP
2007
IEEE
13 years 5 months ago
Interferometric Synthetic Aperture Microscopy: Physics-Based Image Reconstruction from Optical Coherence Tomography Data
Optical coherence tomography (OCT) is an optical ranging technique analogous to radar — detection of back-scattered light produces a signal that is temporally localized at times...
Brynmor J. Davis, Tyler S. Ralston, Daniel L. Mark...
PAMI
2006
225views more  PAMI 2006»
13 years 5 months ago
Robust Structure and Motion from Outlines of Smooth Curved Surfaces
: This article addresses the problem of estimating the motion of a camera as it observes the outline (or apparent contour) of a solid bounded by a smooth surface in successive imag...
Yasutaka Furukawa, Amit Sethi, Jean Ponce, David J...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 4 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang