Sciweavers

1717 search results - page 340 / 344
» Error concealment using a diffusion based method
Sort
View
SMA
2003
ACM
163views Solid Modeling» more  SMA 2003»
15 years 3 months ago
Fast swept volume approximation of complex polyhedral models
We present an efficient algorithm to approximate the swept volume (SV) of a complex polyhedron along a given trajectory. Given the boundary description of the polyhedron and a pat...
Young J. Kim, Gokul Varadhan, Ming C. Lin, Dinesh ...
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
15 years 2 months ago
Improving data mining utility with projective sampling
Overall performance of the data mining process depends not just on the value of the induced knowledge but also on various costs of the process itself such as the cost of acquiring...
Mark Last
CIKM
1997
Springer
15 years 1 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
14 years 10 months ago
Application domain study of evolutionary algorithms in optimization problems
This paper deals with the problem of comparing and testing evolutionary algorithms, that is, the benchmarking problem, from an analysis point of view. A practical study of the app...
Pilar Caamaño, Francisco Bellas, José...
JIB
2007
153views more  JIB 2007»
14 years 9 months ago
Duplicate detection of 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectra are used in the (structural) analysis of small molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra correlate the chemical shifts o...
Alexander Hinneburg, Björn Egert, Andrea Porz...