Sciweavers

230 search results - page 43 / 46
» Simultaneous Avoidance Of Generalized Patterns
Sort
View
96
Voted
GIS
2010
ACM
14 years 11 months ago
Efficiently locating photographs in many panoramas
We present a method for efficient and reliable geo-positioning of images. It relies on image-based matching of the query images onto a trellis of existing images that provides acc...
Michael Kroepfl, Yonatan Wexler, Eyal Ofek
136
Voted
ICCAD
2009
IEEE
147views Hardware» more  ICCAD 2009»
14 years 11 months ago
SAT-based protein design
Computational protein design can be formulated as an optimization problem, where the objective is to identify the sequence of amino acids that minimizes the energy of a given prot...
Noah Ollikainen, Ellen Sentovich, Carlos Coelho, A...
111
Voted
ACL
2012
13 years 3 months ago
Finding Bursty Topics from Microblogs
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Al...
Qiming Diao, Jing Jiang, Feida Zhu, Ee-Peng Lim
KDD
2008
ACM
119views Data Mining» more  KDD 2008»
16 years 1 months ago
SAIL: summation-based incremental learning for information-theoretic clustering
Information-theoretic clustering aims to exploit information theoretic measures as the clustering criteria. A common practice on this topic is so-called INFO-K-means, which perfor...
Junjie Wu, Hui Xiong, Jian Chen
110
Voted
CCS
2007
ACM
15 years 7 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen