Sciweavers

1298 search results - page 199 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
158
Voted
SDM
2009
SIAM
251views Data Mining» more  SDM 2009»
16 years 17 days ago
High Performance Parallel/Distributed Biclustering Using Barycenter Heuristic.
Biclustering refers to simultaneous clustering of objects and their features. Use of biclustering is gaining momentum in areas such as text mining, gene expression analysis and co...
Alok N. Choudhary, Arifa Nisar, Waseem Ahmad, Wei-...
164
Voted
VIS
2004
IEEE
136views Visualization» more  VIS 2004»
16 years 4 months ago
Visibility Culling for Time-Varying Volume Rendering Using Temporal Occlusion Coherence
Typically there is a high coherence in data values between neighboring time steps in an iterative scientific software simulation; this characteristic similarly contributes to a co...
Jinzhu Gao, Han-Wei Shen, Jian Huang, James Arthur...
130
Voted
ICPR
2006
IEEE
16 years 4 months ago
Adaptive Discriminant Projection for Content-based Image Retrieval
Content-based Image Retrieval (CBIR) is a computer vision application that aims at automatically retrieving images based on their visual content. Linear Discriminat Analysis and i...
Jie Yu, Qi Tian
ICPR
2004
IEEE
16 years 4 months ago
Model Based Object Recognition by Robust Information Fusion
Given a set of 3D model features and their 2D image, model based object recognition determines the correspondences between those features and hence computes the pose of the object...
Haifeng Chen, Ilan Shimshoni, Peter Meer
IJCAI
2003
15 years 4 months ago
Where is ...? Learning and Utilizing Motion Patterns of Persons with Mobile Robots
Whenever people move through their environments they do not move randomly. Instead, they usually follow specific trajectories or motion patterns corresponding to their intentions....
Grzegorz Cielniak, Maren Bennewitz, Wolfram Burgar...