Sciweavers

304 search results - page 40 / 61
» Comparing the Robustness of Expansion Techniques and Retriev...
Sort
View
KDD
2000
ACM
168views Data Mining» more  KDD 2000»
15 years 1 months ago
Scaling up dynamic time warping for datamining applications
There has been much recent interest in adapting data mining algorithms to time series databases. Most of these algorithms need to compare time series. Typically some variation of ...
Eamonn J. Keogh, Michael J. Pazzani
CLEF
2006
Springer
15 years 1 months ago
CLEF 2006: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2006 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual, and multilingual...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
MM
2010
ACM
221views Multimedia» more  MM 2010»
14 years 10 months ago
Building book inventories using smartphones
Manual generation of a book inventory is time-consuming and tedious, while deployment of barcode and radio-frequency identification (RFID) management systems is costly and afforda...
David M. Chen, Sam S. Tsai, Bernd Girod, Cheng-Hsi...
IJNSEC
2007
193views more  IJNSEC 2007»
14 years 10 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
SGP
2007
15 years 11 days ago
Reconstruction of deforming geometry from time-varying point clouds
In this paper, we describe a system for the reconstruction of deforming geometry from a time sequence of unstructured, noisy point clouds, as produced by recent real-time range sc...
Michael Wand, Philipp Jenke, Qi-Xing Huang, Martin...