Sciweavers

39 search results - page 6 / 8
» Outlier Detection Using Random Walks
Sort
View
87
Voted
SDM
2009
SIAM
291views Data Mining» more  SDM 2009»
15 years 6 months ago
Detection and Characterization of Anomalies in Multivariate Time Series.
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...
PAMI
1998
124views more  PAMI 1998»
14 years 9 months ago
Robust Adaptive Segmentation of Range Images
—We propose a novel image segmentation technique using the robust, adaptive least kth order squares (ALKS) estimator which minimizes the kth order statistics of the squared of re...
Kil-Moo Lee, Peter Meer, Rae-Hong Park
ECCV
2008
Springer
15 years 11 months ago
Analysis of Building Textures for Reconstructing Partially Occluded Facades
Abstract. As part of an architectural modeling project, this paper investigates the problem of understanding and manipulating images of buildings. Our primary motivation is to auto...
Thommen Korah, Christopher Rasmussen
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
15 years 10 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao