Sciweavers

2463 search results - page 294 / 493
» Compressing Pattern Databases
Sort
View
JSAC
2006
165views more  JSAC 2006»
14 years 10 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ICASSP
2011
IEEE
14 years 2 months ago
A distance-based slice interleaving scheme for robust video transmission over error-prone networks
Video transmission over wireless networks suffers from packet loss due to either temporary packet drop or fadinginduced bit errors. To ensure that the quality of the decoded video...
Yu Wang, Jo Yew Tham, Kwong Huang Goh, Wei Siong L...
ICASSP
2011
IEEE
14 years 2 months ago
Using residual vector quantization for image content classification
Multistage residual vector quantizers (RVQ) with optimal direct sum decoder codebooks have been successfully designed and implemented for data compression. Due to its multistage s...
Syed Irteza Ali Khan, Christopher F. Barnes
ADVIS
2004
Springer
15 years 3 months ago
Incremental Association Rule Mining Using Materialized Data Mining Views
Data mining is an interactive and iterative process. Users issue series of similar queries until they receive satisfying results, yet currently available data mining systems do not...
Mikolaj Morzy, Tadeusz Morzy, Zbyszko Króli...
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 2 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...