Sciweavers

7930 search results - page 1468 / 1586
» Greedy in Approximation Algorithms
Sort
View
GLOBECOM
2010
IEEE
15 years 1 months ago
Predicting Critical Intradomain Routing Events
Network equipments generate an overwhelming number of reports and alarms every day, but only a small fraction of these alarms require the intervention of network operators. Our goa...
Amelie Medem Kuatse, Renata Teixeira, Nicolas Usun...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
15 years 1 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
162
Voted
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
15 years 1 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...
ICIP
2010
IEEE
15 years 1 months ago
Non-rigid image registration by using graph-cuts with mutual information
Non-rigid image registration plays an important role in medical image analysis. Recently, Tang and Chung proposed to model the non-rigid medical image registration problem as an e...
Ronald W. K. So, Albert C. S. Chung
ICIP
2010
IEEE
15 years 1 months ago
Accelerated video encoding using render context information
In this paper, we present a method to speed up video encoding of GPU rendered 3D scenes, which is particularly suited for the efficient and low-delay encoding of 3D game output as...
Philipp Fechteler, Peter Eisert
« Prev « First page 1468 / 1586 Last » Next »