Sciweavers

1035 search results - page 148 / 207
» Cluster validation using information stability measures
Sort
View
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
CIKM
2010
Springer
14 years 8 months ago
Semantic tags generation and retrieval for online advertising
One of the main problems in online advertising is to display ads which are relevant and appropriate w.r.t. what the user is looking for. Often search engines fail to reach this go...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
KES
2004
Springer
15 years 3 months ago
Analyzing the Temporal Sequences for Text Categorization
– This paper describes a text categorization approach that is based on a combination of a newly designed text representation with a kNN classifier. The new text document represen...
Xiao Luo, A. Nur Zincir-Heywood
89
Voted
VISUALIZATION
2000
IEEE
15 years 2 months ago
Topology preserving compression of 2D vector fields
We present an algorithm for compressing 2D vector fields that preserves topology. Our approach is to simplify the given data set using constrained clustering. We employ different...
Suresh K. Lodha, Jose C. Renteria, Krishna M. Rosk...
ISLPED
2010
ACM
205views Hardware» more  ISLPED 2010»
14 years 10 months ago
Peak power modeling for data center servers with switched-mode power supplies
Accurately modeling server power consumption is critical in designing data center power provisioning infrastructure. However, to date, most research proposals have used average CP...
David Meisner, Thomas F. Wenisch