Sciweavers

3480 search results - page 583 / 696
» General Image Database Model
Sort
View
PR
2007
143views more  PR 2007»
15 years 2 months ago
Shadow resistant tracking using inertia constraints
In this paper, we present a new method for tracking objects with shadows. Traditional motion-based tracking schemes cannot usually distinguish the shadow from the object itself, a...
Hao Jiang, Mark S. Drew
232
Voted
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
16 years 5 months ago
Finding Time-Lagged 3D Clusters
Existing 3D clustering algorithms on gene ? sample ? time expression data do not consider the time lags between correlated gene expression patterns. Besides, they either ignore the...
Xin Xu, Ying Lu, Kian-Lee Tan, Anthony K. H. Tung
121
Voted
KDD
2009
ACM
164views Data Mining» more  KDD 2009»
16 years 3 months ago
Social influence analysis in large-scale networks
In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the fri...
Jie Tang, Jimeng Sun, Chi Wang, Zi Yang
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 3 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 3 months ago
Relational data pre-processing techniques for improved securities fraud detection
Commercial datasets are often large, relational, and dynamic. They contain many records of people, places, things, events and their interactions over time. Such datasets are rarel...
Andrew Fast, Lisa Friedland, Marc Maier, Brian Tay...