Sciweavers

2351 search results - page 358 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 4 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
CSB
2005
IEEE
202views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Head and Neck Cancer Metastasis Prediction via Artificial Neural Networks
Cancers in head and neck tends to spread to nearby lymph nodes. Lymph nodes trap the spreading tumor cells but then the tumor starts to grow in these nodes and then spread further...
Eveleen Darby, Tezeswari Nettimi, Shilpa Kodali, L...
GECCO
2008
Springer
107views Optimization» more  GECCO 2008»
14 years 11 months ago
The influence of scaling and assortativity on takeover times in scale-free topologies
In evolving systems, the topological characteristics of population structure have a pronounced impact on the rate of spread of advantageous alleles, and therefore affect selective...
Joshua L. Payne, Margaret J. Eppstein
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 10 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...