Sciweavers

1287 search results - page 188 / 258
» Effective Performance Measurement at Petascale Using IPM
Sort
View
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 3 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
IMR
2005
Springer
15 years 3 months ago
A Computational Framework for Generating Sizing Function in Assembly Meshing
This paper proposes a framework for generating sizing function in meshing assemblies. Size control is crucial in obtaining a high-quality mesh with a reduced number of elements, w...
William Roshan Quadros, Ved Vyas, Michael L. Brewe...
RAID
2005
Springer
15 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
MIR
2003
ACM
169views Multimedia» more  MIR 2003»
15 years 3 months ago
Design, implementation and testing of an interactive video retrieval system
In this paper we present and discuss the system we developed for the search task of the TRECVID 2002, and its evaluation in an interactive search task. To do this we will look at ...
Georgina Gaughan, Alan F. Smeaton, Cathal Gurrin, ...
ISMAR
2002
IEEE
15 years 2 months ago
Alternative Tools for Tangible Interaction: A Usability Evaluation
In this work we compare an in-house designed Tangible User Interface (TUI) with three alternative single-user tools through an empirical investigation. These three alternative too...
Morten Fjeld, Sissel Guttormsen Schär, Domeni...