Sciweavers

2356 search results - page 438 / 472
» Characterizations of postman sets
Sort
View
128
Voted
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
15 years 5 months ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
EVOW
2007
Springer
15 years 5 months ago
Scale Invariance for Evolved Interest Operators
Abstract. This work presents scale invariant region detectors that apply evolved operators to extract an interest measure. We evaluate operators using their repeatability rate, and...
Leonardo Trujillo, Gustavo Olague
150
Voted
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 5 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
ICC
2007
IEEE
168views Communications» more  ICC 2007»
15 years 5 months ago
Centralized Radio Resource Allocation for OFDMA Cellular Systems
Efficient resource allocation in cellular OFDMA systems envisages the assignment of the number of subcarriers and the relative transmission format on the basis of the experimented ...
Andrea Abrardo, Alessandro Alessio, Paolo Detti, M...
119
Voted
AINA
2004
IEEE
15 years 5 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen