Sciweavers

16070 search results - page 73 / 3214
» Identifying
Sort
View
118
Voted
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
15 years 10 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
119
Voted
ICMCS
2007
IEEE
169views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions
Computer graphics generated by advanced rendering software come to appear so photorealistic that it has become difficult for people to visually differentiate them from photographi...
Wen Chen, Yun Q. Shi, Guorong Xuan
136
Voted
ICNP
2007
IEEE
15 years 10 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
131
Voted
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 10 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
143
Voted
UM
2007
Springer
15 years 9 months ago
Identifiability: A Fundamental Problem of Student Modeling
In this paper we show how model identifiability is an issue for student modeling: observed student performance corresponds to an infinite family of possible model parameter estimat...
Joseph E. Beck, Kai-min Chang