Sciweavers

8655 search results - page 1331 / 1731
» Challenges for Trusted Computing
Sort
View
PKDD
2005
Springer
94views Data Mining» more  PKDD 2005»
15 years 9 months ago
Visual Terrain Analysis of High-Dimensional Datasets
Abstract. Most real-world datasets are, to a certain degree, skewed. When considered that they are also large, they become the pinnacle challenge in data analysis. More importantly...
Wenyuan Li, Kok-Leong Ong, Wee Keong Ng
SAMOS
2005
Springer
15 years 9 months ago
Modeling NoC Architectures by Means of Deterministic and Stochastic Petri Nets
The design of appropriate communication architectures for complex Systems-on-Chip (SoC) is a challenging task. One promising alternative to solve these problems are Networks-on-Chi...
Holger Blume, Thorsten von Sydow, Daniel Becker, T...
SG
2005
Springer
15 years 9 months ago
Engaging in a Conversation with Synthetic Characters Along the Virtuality Continuum
Abstract. During the last decade research groups as well as a number of commercial software developers have started to deploy embodied conversational characters in the user interfa...
Elisabeth André, Klaus Dorfmüller-Ulha...
SLSFS
2005
Springer
15 years 9 months ago
Incorporating Constraints and Prior Knowledge into Factorization Algorithms - An Application to 3D Recovery
Abstract. Matrix factorization is a fundamental building block in many computer vision and machine learning algorithms. In this work we focus on the problem of ”structure from mo...
Amit Gruber, Yair Weiss
VLDB
2005
ACM
118views Database» more  VLDB 2005»
15 years 9 months ago
Mining Compressed Frequent-Pattern Sets
A major challenge in frequent-pattern mining is the sheer size of its mining results. In many cases, a high min sup threshold may discover only commonsense patterns but a low one ...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng
« Prev « First page 1331 / 1731 Last » Next »