Sciweavers

5344 search results - page 945 / 1069
» Privacy-Preserving Set Operations
Sort
View
ECCV
2006
Springer
16 years 5 months ago
Detecting Instances of Shape Classes That Exhibit Variable Structure
This paper proposes a method for detecting instances of shape classes that exhibit variable structure. The term "variable structure" is used to characterize shape classes...
Vassilis Athitsos, Jingbin Wang, Stan Sclaroff, Ma...
ICIP
2003
IEEE
16 years 4 months ago
Robust line detection using a weighted MSE estimator
In this paper we introduce a novel line detection algorithm based on a weighted minimum mean square error (MSE) formulation. This algorithm has been developed to enable an autonom...
Guido M. Schuster, Aggelos K. Katsaggelos
117
Voted
ICIP
2000
IEEE
16 years 4 months ago
Look up Table (LUT) Method for Image Halftoning
Recently we have applied Look Up Table (LUT) Method for inverse halftoning. We also proposed tree-structure LUT inverse halftoning in order to reduce memory requirements of the LU...
Murat Mese, Palghat P. Vaidyanathan
ICDE
2008
IEEE
195views Database» more  ICDE 2008»
16 years 4 months ago
Scalable Rule-Based Gene Expression Data Classification
Abstract-- Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: (i) Association rule mining from training data followed by (i...
Mark A. Iwen, Willis Lang, Jignesh M. Patel
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 4 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...