Sciweavers

3766 search results - page 616 / 754
» Projection for pattern recognition
Sort
View
SAC
2010
ACM
15 years 4 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
AIPR
2003
IEEE
15 years 4 months ago
Registration of Range Data from Unmanned Aerial and Ground Vehicles
In the research reported in this paper, we propose to overcome the unavailability of Global Positioning System (GPS) using combined information obtained from a scanning LADAR rang...
Anthony Downs, Raj Madhavan, Tsai Hong
AIPR
2003
IEEE
15 years 4 months ago
Band Selection Using Independent Component Analysis for Hyperspectral Image Processing
Although hyperspectral images provide abundant information about objects, their high dimensionality also substantially increases computational burden. Dimensionality reduction off...
Hongtao Du, Hairong Qi, Xiaoling Wang, Rajeev Rama...
ICDM
2003
IEEE
160views Data Mining» more  ICDM 2003»
15 years 4 months ago
Indexing and Mining Free Trees
Tree structures are used extensively in domains such as computational biology, pattern recognition, computer networks, and so on. In this paper, we present an indexing technique f...
Yun Chi, Yirong Yang, Richard R. Muntz
INFOVIS
2003
IEEE
15 years 4 months ago
A Visual Workspace for Hybrid Multidimensional Scaling Algorithms
In visualising multidimensional data, it is well known that different types of data require different types of algorithms to process them. Data sets might be distinguished accordi...
Greg Ross, Matthew Chalmers