Sciweavers

2032 search results - page 364 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
PR
2000
166views more  PR 2000»
14 years 9 months ago
A window-based inverse Hough transform
In this paper a new Hough transform inversion technique is proposed. It is a window-based inverse Hough transform algorithm, which reconstructs the original image using only the d...
Anastasios L. Kesidis, Nikos Papamarkos
BMCBI
2010
87views more  BMCBI 2010»
14 years 9 months ago
Epigenetic domains found in mouse embryonic stem cells via a hidden Markov model
Background: Epigenetics is an important layer of transcriptional control necessary for cell-type specific gene regulation. Recent studies have shown significant epigenetic pattern...
Jessica L. Larson, Guo-Cheng Yuan
KDD
2009
ACM
243views Data Mining» more  KDD 2009»
15 years 10 months ago
Exploiting Wikipedia as external knowledge for document clustering
In traditional text clustering methods, documents are represented as "bags of words" without considering the semantic information of each document. For instance, if two ...
Xiaohua Hu, Xiaodan Zhang, Caimei Lu, E. K. Park, ...
DSN
2007
IEEE
15 years 1 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
RTSS
2006
IEEE
15 years 3 months ago
Voice over Sensor Networks
Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due ...
Rahul Mangharam, Anthony Rowe, Raj Rajkumar, Ryohe...