Sciweavers

605 search results - page 106 / 121
» Normalizers and Split Extensions
Sort
View
MICCAI
2002
Springer
15 years 11 months ago
A Novel Image Similarity Measure for Registration of 3-D MR Images and X-Ray Projection Images
Most existing methods for registration of three-dimensional tomographic images to two-dimensional projection images use simulated projection images and either intensity-based or fe...
Torsten Rohlfing, Calvin R. Maurer Jr.
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
15 years 11 months ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 11 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
STOC
2007
ACM
105views Algorithms» more  STOC 2007»
15 years 11 months ago
Balanced allocations: the weighted case
We investigate balls-and-bins processes where m weighted balls are placed into n bins using the "power of two choices" paradigm, whereby a ball is inserted into the less...
Kunal Talwar, Udi Wieder
OSDI
2004
ACM
15 years 11 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...