Sciweavers

2775 search results - page 393 / 555
» Differencing Data Streams
Sort
View
MOBISYS
2009
ACM
15 years 10 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
ICDM
2006
IEEE
91views Data Mining» more  ICDM 2006»
15 years 4 months ago
Entropy-based Concept Shift Detection
When monitoring sensory data (e.g., from a wearable device) the context oftentimes changes abruptly: people move from one situation (e.g., working quietly in their office) to ano...
Peter Vorburger, Abraham Bernstein
ICIP
2004
IEEE
15 years 11 months ago
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of no...
Philippe Jost, Pierre Vandergheynst, Pascal Frossa...
ICDE
2006
IEEE
164views Database» more  ICDE 2006»
15 years 11 months ago
New Sampling-Based Estimators for OLAP Queries
One important way in which sampling for approximate query processing in a database environment differs from traditional applications of sampling is that in a database, it is feasi...
Ruoming Jin, Leonid Glimcher, Chris Jermaine, Gaga...
ICML
2008
IEEE
15 years 11 months ago
Modeling interleaved hidden processes
Hidden Markov models assume that observations in time series data stem from some hidden process that can be compactly represented as a Markov chain. We generalize this model by as...
Niels Landwehr