Sciweavers

1663 search results - page 327 / 333
» Computer Security in the Real World
Sort
View
SIGIR
2011
ACM
14 years 2 months ago
Utilizing marginal net utility for recommendation in e-commerce
Traditional recommendation algorithms often select products with the highest predicted ratings to recommend. However, earlier research in economics and marketing indicates that a ...
Jian Wang, Yi Zhang
ICDAR
2011
IEEE
13 years 11 months ago
Three Dimensional Rotation-Free Recognition of Characters
—In this paper, we propose a new method for three dimensional rotation-free recognition of characters in scene. In the proposed method, we employ the Modified Quadratic Discrimi...
Ryo Narita, Wataru Ohyama, Tetsushi Wakabayashi, F...
JMLR
2012
13 years 2 months ago
Metric and Kernel Learning Using a Linear Transformation
Metric and kernel learning arise in several machine learning applications. However, most existing metric learning algorithms are limited to learning metrics over low-dimensional d...
Prateek Jain, Brian Kulis, Jason V. Davis, Inderji...
SDM
2012
SIAM
285views Data Mining» more  SDM 2012»
13 years 2 months ago
A Novel Approximation to Dynamic Time Warping allows Anytime Clustering of Massive Time Series Datasets
Given the ubiquity of time series data, the data mining community has spent significant time investigating the best time series similarity measure to use for various tasks and dom...
Qiang Zhu 0002, Gustavo E. A. P. A. Batista, Thana...
CCGRID
2003
IEEE
15 years 5 months ago
Using grid technologies to face medical image analysis challenges
The availability of digital imagers inside hospitals and their ever growing inspection capabilities have established digital medical images as a key component of many pathologies ...
Johan Montagnat, Vincent Breton, Isabelle E. Magni...