Sciweavers

506 search results - page 95 / 102
» Feature Selection for the Classification of Large Document C...
Sort
View
AIRWEB
2008
Springer
14 years 11 months ago
The anti-social tagger: detecting spam in social bookmarking systems
The annotation of web sites in social bookmarking systems has become a popular way to manage and find information on the web. The community structure of such systems attracts spam...
Beate Krause, Christoph Schmitz, Andreas Hotho, Ge...
DSOM
2007
Springer
15 years 3 months ago
Probabilistic Fault Diagnosis Using Adaptive Probing
Past research on probing-based network monitoring provides solutions based on preplanned probing which is computationally expensive, is less accurate, and involves a large manageme...
Maitreya Natu, Adarshpal S. Sethi

Publication
151views
13 years 1 months ago
Can faces verify blood-relations?
Humans can verify unknown parent-offspring and sibling pairs over unrelated subject pairs. A computational scheme to accomplish the task robustly, in the presence of challenges due...
Gowri Somanath, Chandra Kambhamettu
ICPR
2006
IEEE
15 years 10 months ago
Learning Pairwise Similarity for Data Clustering
Each clustering algorithm induces a similarity between given data points, according to the underlying clustering criteria. Given the large number of available clustering technique...
Ana L. N. Fred, Anil K. Jain
CORR
2010
Springer
153views Education» more  CORR 2010»
14 years 9 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan