Sciweavers

743 search results - page 114 / 149
» Performance Measurements for Privacy Preserving Data Mining
Sort
View
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
15 years 8 months ago
Quantifying Input and Output Spike Statistics of a Winner-Take-All Network in a Vision System
— Event-driven spike-based processing systems offer new possibilities for real-time vision. Signals are encoded asynchronously in time thus preserving the time information of the...
Matthias Oster, Rodney J. Douglas, Shih-Chii Liu
108
Voted
MSR
2006
ACM
15 years 7 months ago
Are refactorings less error-prone than other changes?
Refactorings are program transformations which should preserve the program behavior. Consequently, we expect that during phases when there are mostly refactorings in the change hi...
Peter Weißgerber, Stephan Diehl
ICIP
2010
IEEE
14 years 12 months ago
A no-reference image content metric and its application to denoising
A no-reference image metric based on the singular value decomposition of local image gradients is proposed in this paper. This metric provides a quantitative measure of true image...
Xiang Zhu, Peyman Milanfar
KDD
2001
ACM
203views Data Mining» more  KDD 2001»
16 years 2 months ago
Ensemble-index: a new approach to indexing large databases
The problem of similarity search (query-by-content) has attracted much research interest. It is a difficult problem because of the inherently high dimensionality of the data. The ...
Eamonn J. Keogh, Selina Chu, Michael J. Pazzani
WWW
2004
ACM
16 years 2 months ago
Affinity rank: a new scheme for efficient web search
Maximizing only the relevance between queries and documents will not satisfy users if they want the top search results to present a wide coverage of topics by a few representative...
Yi Liu, Benyu Zhang, Zheng Chen, Michael R. Lyu, W...