Sciweavers

4466 search results - page 661 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
167
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Co-training for Handwritten Word Recognition
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
130
Voted
IMR
2005
Springer
15 years 9 months ago
Design and Implementation of a Corporate Mesh Object
Today, finite element technologies allow engineers to analyze complex assemblies and subsystems. With CPU power constantly increasing, it is not unreasonable to state that the eng...
John Svitek, Wa Kwok, Joseph R. Tristano
120
Voted
PKDD
1999
Springer
130views Data Mining» more  PKDD 1999»
15 years 8 months ago
OPTICS-OF: Identifying Local Outliers
: For many KDD applications finding the outliers, i.e. the rare events, is more interesting and useful than finding the common cases, e.g. detecting criminal activities in E-commer...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...
142
Voted
IEEEPACT
2005
IEEE
15 years 9 months ago
HUNTing the Overlap
Hiding communication latency is an important optimization for parallel programs. Programmers or compilers achieve this by using non-blocking communication primitives and overlappi...
Costin Iancu, Parry Husbands, Paul Hargrove
244
Voted
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
16 years 3 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...