Sciweavers

3370 search results - page 354 / 674
» Correlation Embedding Analysis
Sort
View
123
Voted
PKDD
2010
Springer
155views Data Mining» more  PKDD 2010»
15 years 2 months ago
Latent Structure Pattern Mining
Pattern mining methods for graph data have largely been restricted to ground features, such as frequent or correlated subgraphs. Kazius et al. have demonstrated the use of elaborat...
Andreas Maunz, Christoph Helma, Tobias Cramer, Ste...
117
Voted
ICIP
2010
IEEE
15 years 1 months ago
Objective assessment of tone mapping algorithms
There has been a growing interest in recent years to develop tone mapping algorithms that can convert high dynamic range (HDR) to low dynamic range (LDR) images, so that they can ...
Hojatollah Yeganeh, Zhou Wang
157
Voted
HICSS
2011
IEEE
201views Biometrics» more  HICSS 2011»
14 years 7 months ago
Negotiating Social Belonging: Online, Offline, and In-Between
This study investigates contemporary college students’ social behavior on- and offline. Although being socially active typically enhances access to resources embedded in social ...
Michael A. Steafnone, Yu Chao Huang, Derek Lackaff
115
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng
143
Voted
LCTRTS
2005
Springer
15 years 9 months ago
Preventing interrupt overload
Performance guarantees can be given to tasks in an embedded system by ensuring that access to each shared resource is mediated by an appropriate scheduler. However, almost all pre...
John Regehr, Usit Duongsaa