Sciweavers

2421 search results - page 252 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
PAKDD
2005
ACM
112views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Approximated Clustering of Distributed High-Dimensional Data
In many modern application ranges high-dimensional feature vectors are used to model complex real-world objects. Often these objects reside on different local sites. In this paper,...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
ECML
1998
Springer
15 years 8 months ago
Predicate Invention and Learning from Positive Examples Only
Previous bias shift approaches to predicate invention are not applicable to learning from positive examples only, if a complete hypothesis can be found in the given language, as ne...
Henrik Boström
SSWMC
2004
15 years 6 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
131
Voted
ANSS
2004
IEEE
15 years 8 months ago
Cache Simulation Based on Runtime Instrumentation for OpenMP Applications
To enable optimizations in memory access behavior of high performance applications, cache monitoring is a crucial process. Simulation of cache hardware is needed in order to allow...
Jie Tao, Josef Weidendorfer
DASFAA
2009
IEEE
96views Database» more  DASFAA 2009»
15 years 8 months ago
A Revisit of Query Expansion with Different Semantic Levels
Abstract. Query expansion has received extensive attention in information retrieval community. Although semantic based query expansion appears to be promising in improving retrieva...
Ce Zhang, Bin Cui, Gao Cong, Yu-Jing Wang