Sciweavers

10414 search results - page 1762 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 9 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
SIGMOD
2010
ACM
171views Database» more  SIGMOD 2010»
15 years 9 months ago
Variance aware optimization of parameterized queries
Parameterized queries are commonly used in database applications. In a parameterized query, the same SQL statement is potentially executed multiple times with different parameter ...
Surajit Chaudhuri, Hongrae Lee, Vivek R. Narasayya
ISNN
2010
Springer
15 years 9 months ago
Applications of Second Order Blind Identification to High-Density EEG-Based Brain Imaging: A Review
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...
Akaysha Tang
PAKDD
2010
ACM
198views Data Mining» more  PAKDD 2010»
15 years 9 months ago
A Better Strategy of Discovering Link-Pattern Based Communities by Classical Clustering Methods
Abstract. The definition of a community in social networks varies with applications. To generalize different types of communities, the concept of linkpattern based community was pr...
Chen-Yi Lin, Jia-Ling Koh, Arbee L. P. Chen
MM
2009
ACM
249views Multimedia» more  MM 2009»
15 years 9 months ago
MyFinder: near-duplicate detection for large image collections
The explosive growth of multimedia data poses serious challenges to data storage, management and search. Efficient near-duplicate detection is one of the required technologies for...
Xin Yang, Qiang Zhu, Kwang-Ting Cheng
« Prev « First page 1762 / 2083 Last » Next »