Sciweavers

3135 search results - page 531 / 627
» Feature Extraction Using ICA
Sort
View
PKDD
2004
Springer
79views Data Mining» more  PKDD 2004»
15 years 3 months ago
A Framework for Data Mining Pattern Management
Abstract. To represent and manage data mining patterns, several aspects have to be taken into account: (i) patterns are heterogeneous in nature; (ii) patterns can be extracted from...
Barbara Catania, Anna Maddalena, Maurizio Mazza, E...
ACSAC
2004
IEEE
15 years 1 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
AIRS
2006
Springer
15 years 1 months ago
Automatic Query Type Identification Based on Click Through Information
We report on a study that was undertaken to better identify users' goals behind web search queries by using click through data. Based on user logs which contain over 80 millio...
Yiqun Liu, Min Zhang, Liyun Ru, Shaoping Ma
WSCG
2003
188views more  WSCG 2003»
14 years 11 months ago
Camera Self-Calibration in Underwater Environment
This paper presents a self-calibration technique for a camera mounted on an underwater vehicle designed to perform the 3D reconstruction of underwater scenes. Our aim is to identi...
N. Pessel, Jan Opderbecke, Marie-José Aldon
MM
2010
ACM
243views Multimedia» more  MM 2010»
14 years 10 months ago
Mobile product recognition
We present a mobile product recognition system for the camera-phone. By snapping a picture of a product with a camera-phone, the user can retrieve online information of the produc...
Sam S. Tsai, David M. Chen, Vijay Chandrasekhar, G...