Sciweavers

2229 search results - page 104 / 446
» Comparative analysis of biclustering algorithms
Sort
View
DELOS
2000
15 years 6 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber
175
Voted
CIKM
2011
Springer
14 years 4 months ago
Structural link analysis and prediction in microblogs
With hundreds of millions of participants, social media services have become commonplace. Unlike a traditional social network service, a microblogging network like Twitter is a hy...
Dawei Yin, Liangjie Hong, Brian D. Davison
ISPAN
1999
IEEE
15 years 9 months ago
Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks
In this work, we develop a novel mathematical model to analyze di erent location update protocols for mobile cellular network. Our model can capture many important features of use...
John C. S. Lui, Cedric C. F. Fong, H. W. Chan
CORR
2008
Springer
84views Education» more  CORR 2008»
15 years 4 months ago
The Latent Relation Mapping Engine: Algorithm and Experiments
Many AI researchers and cognitive scientists have argued that analogy is the core of cognition. The most influential work on computational modeling of analogy-making is Structure ...
Peter D. Turney
JSAC
2006
165views more  JSAC 2006»
15 years 4 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy