Sciweavers

4955 search results - page 773 / 991
» Multiple Pattern Databases
Sort
View
ICDM
2008
IEEE
102views Data Mining» more  ICDM 2008»
15 years 8 months ago
Mining Order-Preserving Submatrices from Data with Repeated Measurements
Order-preserving submatrices (OPSM’s) have been shown useful in capturing concurrent patterns in data when the relative magnitudes of data items are more important than their ab...
Chun Kit Chui, Ben Kao, Kevin Y. Yip, Sau Dan Lee
128
Voted
ISCAS
2008
IEEE
145views Hardware» more  ISCAS 2008»
15 years 8 months ago
Group learning using contrast NMF : Application to functional and structural MRI of schizophrenia
— Non-negative Matrix factorization (NMF) has increasingly been used as a tool in signal processing in the last couple of years. NMF, like independent component analysis (ICA) is...
Vamsi K. Potluru, Vince D. Calhoun
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 8 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
127
Voted
3DIM
2007
IEEE
15 years 8 months ago
Surround Structured Lighting for Full Object Scanning
This paper presents a new system for acquiring complete 3D surface models using a single structured light projector, a pair of planar mirrors, and one or more synchronized cameras...
Douglas Lanman, Daniel E. Crispell, Gabriel Taubin
ACSAC
2007
IEEE
15 years 8 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves