Sciweavers

417 search results - page 44 / 84
» Performance Analysis of Three Text-Join Algorithms
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
88
Voted
MM
2004
ACM
101views Multimedia» more  MM 2004»
15 years 3 months ago
Searching notated polyphonic music using transportation distances
We present a method for searching databases of symbolically represented polyphonic music that exploits advantages of transportation distances such as continuity and partial matchi...
Rainer Typke, Remco C. Veltkamp, Frans Wiering
BMCBI
2010
243views more  BMCBI 2010»
14 years 9 months ago
Comparative study of unsupervised dimension reduction techniques for the visualization of microarray gene expression data
Background: Visualization of DNA microarray data in two or three dimensional spaces is an important exploratory analysis step in order to detect quality issues or to generate new ...
Christoph Bartenhagen, Hans-Ulrich Klein, Christia...
CVPR
2004
IEEE
15 years 1 months ago
Camera Calibration from a Single Night Sky Image
We present a simple and universal camera calibration method. Instead of extensive setups we are exploiting the accurate angular positions of fixed stars. High precision is achieve...
Andreas Klaus, Joachim Bauer, Konrad F. Karner, Pi...
CIA
2008
Springer
14 years 11 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...