Sciweavers

3123 search results - page 617 / 625
» Focusing on pattern matching
Sort
View
TKDE
2008
125views more  TKDE 2008»
14 years 9 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
JCST
2007
151views more  JCST 2007»
14 years 9 months ago
Indexing Future Trajectories of Moving Objects in a Constrained Network
Abstract Advances in wireless sensor networks and positioning technologies enable new applications monitoring moving objects. Some of these applications, such as traffic managemen...
Ji-Dong Chen, Xiao-Feng Meng
JSAC
2007
104views more  JSAC 2007»
14 years 9 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
LRE
2007
101views more  LRE 2007»
14 years 9 months ago
The CHIL audiovisual corpus for lecture and meeting analysis inside smart rooms
The analysis of lectures and meetings inside smart rooms has recently attracted much interest in the literature, being the focus of international projects and technology evaluation...
Djamel Mostefa, Nicolas Moreau, Khalid Choukri, Ge...
ALIFE
2002
14 years 9 months ago
Bioinspired Engineering of Exploration Systems for NASA and DoD
A new approach called bioinspired engineering of exploration systems (BEES) and its value for solving pressing NASA and DoD needs are described. Insects (for example honeybees and ...
Sarita Thakoor, Javaan S. Chahl, Mandyam V. Sriniv...