Sciweavers

5463 search results - page 1037 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
96
Voted
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
15 years 6 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...
115
Voted
CIVR
2007
Springer
241views Image Analysis» more  CIVR 2007»
15 years 6 months ago
A robust scene recognition system for baseball broadcast using data-driven approach
We propose a robust scene recognition system for baseball broadcast videos. This system is based on the data-driven approach which has been successful in continuous speech recogni...
Ryoichi Ando, Koichi Shinoda, Sadaoki Furui, Takah...
96
Voted
IPSN
2007
Springer
15 years 6 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
113
Voted
MCS
2007
Springer
15 years 6 months ago
Classifier Combining Rules Under Independence Assumptions
Classifier combining rules are designed for the fusion of the results from the component classifiers in a multiple classifier system. In this paper, we firstly propose a theoretica...
Shoushan Li, Chengqing Zong
ACSAC
2006
IEEE
15 years 6 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
« Prev « First page 1037 / 1093 Last » Next »