Sciweavers

396 search results - page 71 / 80
» A survey of Knowledge Discovery and Data Mining process mode...
Sort
View
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
15 years 3 months ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...
ICIP
2002
IEEE
15 years 11 months ago
DPF - a perceptual distance function for image retrieval
For almost a decade, Content-Based Image Retrieval has been an active research area, yet one fundamental problem remains largely unsolved: how to measure perceptual similarity. To...
Baitao Li Chang, E. Ching-Tung Wu
81
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
96
Voted
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 1 months ago
Heuristic Algorithm for Interpretation of Non-Atomic Categorical Attributes in Similarity-based Fuzzy Databases - Scalability Ev
- In this work we are analyzing scalability of the heuristic algorithm we used in the past [1-4] to discover knowledge from multi-valued symbolic attributes in fuzzy databases. The...
M. Shahriar Hossain, Rafal A. Angryk
GIS
2007
ACM
15 years 10 months ago
Exploiting automatically inferred constraint-models for building identification in satellite imagery
The building identification (BID) problem is based on a process that uses publicly available information to automatically assign addresses to buildings in satellite imagery. In pr...
Martin Michalowski, Craig A. Knoblock, Kenneth M. ...