Sciweavers

734 search results - page 91 / 147
» Feature analysis for architectural evaluation methods
Sort
View
139
Voted
KDD
2002
ACM
186views Data Mining» more  KDD 2002»
16 years 4 months ago
Topic-conditioned novelty detection
Automated detection of the first document reporting each new event in temporally-sequenced streams of documents is an open challenge. In this paper we propose a new approach which...
Yiming Yang, Jian Zhang, Jaime G. Carbonell, Chun ...
245
Voted
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
16 years 5 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
143
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Skew Estimation for Scanned Documents from "Noises"
The vast majority of the published skew estimation methods for scanned document images are for textual documents. These methods are based on the principle that the skew angles can...
Bo Yuan, Chew Lim Tan
112
Voted
SMI
2007
IEEE
164views Image Analysis» more  SMI 2007»
15 years 10 months ago
Topology driven 3D mesh hierarchical segmentation
In this paper, we propose to address the semanticoriented 3D mesh hierarchical segmentation problem, using enhanced topological skeletons [18]. This high level information drives ...
Julien Tierny, Jean-Philippe Vandeborre, Mohamed D...
136
Voted
ICTAI
2009
IEEE
15 years 10 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones