Sciweavers

91 search results - page 6 / 19
» A supertree method for rooted trees
Sort
View
102
Voted
ICMCS
2005
IEEE
133views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Error resilience and error concealment for embedded wavelet coders
This paper presents an error-resilient coding technique combined with error concealment for embedded wavelet coders. The coded images are partitioned into packets and protected by...
Shih-Hsuan Yang, Po-Feng Cheng
TOG
2008
114views more  TOG 2008»
15 years 7 days ago
Single image tree modeling
In this paper, we introduce a simple sketching method to generate a realistic 3D tree model from a single image. The user draws at least two strokes in the tree image: the first c...
Ping Tan, Tian Fang, Jianxiong Xiao, Peng Zhao, Lo...
92
Voted
BIBE
2005
IEEE
15 years 6 months ago
Diagnostic Rules Induced by an Ensemble Method for Childhood Leukemia
We introduce a new ensemble method based on decision tree to discover significant and diversified rules for subtype classification of childhood acute lymphoblastic leukemia, a ...
Jinyan Li, Huiqing Liu, Ling Li
ICDM
2003
IEEE
160views Data Mining» more  ICDM 2003»
15 years 5 months ago
Indexing and Mining Free Trees
Tree structures are used extensively in domains such as computational biology, pattern recognition, computer networks, and so on. In this paper, we present an indexing technique f...
Yun Chi, Yirong Yang, Richard R. Muntz
ESA
2006
Springer
105views Algorithms» more  ESA 2006»
15 years 4 months ago
Near-Entropy Hotlink Assignments
Consider a rooted tree T of arbitrary maximum degree d representing a collection of n web pages connected via a set of links, all reachable from a source home page represented by ...
Karim Douïeb, Stefan Langerman