Sciweavers

3072 search results - page 582 / 615
» Shape analysis algorithm based on information theory
Sort
View
APWEB
2005
Springer
15 years 3 months ago
Mining Quantitative Associations in Large Database
Association Rule Mining algorithms operate on a data matrix to derive association rule, discarding the quantities of the items, which contains valuable information. In order to mak...
Chenyong Hu, Yongji Wang, Benyu Zhang, Qiang Yang,...
ICMI
2005
Springer
119views Biometrics» more  ICMI 2005»
15 years 3 months ago
Region extraction of a gaze object using the gaze point and view image sequences
Analysis of the human gaze is a basic way to investigate human attention. Similarly, the view image of a human being includes the visual information of what he/she pays attention ...
Norimichi Ukita, Tomohisa Ono, Masatsugu Kidode
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
15 years 3 months ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
MM
2004
ACM
112views Multimedia» more  MM 2004»
15 years 3 months ago
Multi-model similarity propagation and its application for web image retrieval
In this paper, we propose an iterative similarity propagation approach to explore the inter-relationships between Web images and their textual annotations for image retrieval. By ...
Xin-Jing Wang, Wei-Ying Ma, Gui-Rong Xue, Xing Li
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman