Sciweavers

609 search results - page 98 / 122
» Linear-Time Computation of Similarity Measures for Sequentia...
Sort
View
SAC
2009
ACM
15 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
VMV
2001
178views Visualization» more  VMV 2001»
14 years 11 months ago
Consistent Visual Information Processing Applied to Object Recognition Landmark Definition and Real-Time Tracking
The handling of situations where multiple visual information occurs requires the fusion of visual information. This is a very common task found in the processing of multisource / ...
Axel Pinz
ADMA
2010
Springer
271views Data Mining» more  ADMA 2010»
14 years 4 months ago
Exploiting Concept Clumping for Efficient Incremental E-Mail Categorization
We introduce a novel approach to incremental e-mail categorization based on identifying and exploiting "clumps" of messages that are classified similarly. Clumping reflec...
Alfred Krzywicki, Wayne Wobcke
KDD
2004
ACM
108views Data Mining» more  KDD 2004»
15 years 10 months ago
Sleeved coclustering
A coCluster of a m?n matrix X is a submatrix determined by a subset of the rows and a subset of the columns. The problem of finding coClusters with specific properties is of inter...
Avraham A. Melkman, Eran Shaham
CVPR
1996
IEEE
1457views Computer Vision» more  CVPR 1996»
15 years 11 months ago
Edge Detection and Ridge Detection with Automatic Scale Selection
When computing descriptors of image data, the type of information that can be extracted may be strongly dependent on the scales at which the image operators are applied. This arti...
Tony Lindeberg