Sciweavers

745 search results - page 129 / 149
» New method for visual descriptor evaluation
Sort
View
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
CLEF
2009
Springer
14 years 7 months ago
Diversity in Photo Retrieval: Overview of the ImageCLEFPhoto Task 2009
The ImageCLEF Photo Retrieval Task 2009 focused on image retrieval and diversity. A new collection was utilised in this task consisting of approximately half a million images with...
Monica Lestari Paramita, Mark Sanderson, Paul Clou...
WWW
2007
ACM
15 years 10 months ago
Answering relationship queries on the web
Finding relationships between entities on the Web, e.g., the connections between different places or the commonalities of people, is a novel and challenging problem. Existing Web ...
Gang Luo, Chunqiang Tang, Ying-li Tian
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
15 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...