Sciweavers

1298 search results - page 180 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
252
Voted
VIS
2004
IEEE
214views Visualization» more  VIS 2004»
16 years 4 months ago
Surface Reconstruction of Noisy and Defective Data Sets
We present a novel surface reconstruction algorithm that can recover high-quality surfaces from noisy and defective data sets without any normal or orientation information. A set ...
Hui Xie, Kevin T. McDonnell, Hong Qin
132
Voted
WIDM
2004
ACM
15 years 8 months ago
Querying structured data in an unstructured P2P system
Abstract— Peer-to-Peer networking has become a major research topic over the last few years. Sharing of structured data in such decentralized environments is a challenging proble...
Verena Kantere, Dimitrios Tsoumakos, Nick Roussopo...
138
Voted
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
15 years 7 months ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
106
Voted
NIPS
2003
15 years 4 months ago
Phonetic Speaker Recognition with Support Vector Machines
A recent area of significant progress in speaker recognition is the use of high level features—idiolect, phonetic relations, prosody, discourse structure, etc. A speaker not on...
William M. Campbell, Joseph P. Campbell, Douglas A...
140
Voted
RECSYS
2009
ACM
15 years 10 months ago
Latent dirichlet allocation for tag recommendation
Tagging systems have become major infrastructures on the Web. They allow users to create tags that annotate and categorize content and share them with other users, very helpful in...
Ralf Krestel, Peter Fankhauser, Wolfgang Nejdl