Sciweavers

1050 search results - page 147 / 210
» Two methods of authenticated positioning
Sort
View
APWEB
2006
Springer
15 years 5 months ago
Generalized Projected Clustering in High-Dimensional Data Streams
Clustering is to identify densely populated subgroups in data, while correlation analysis is to find the dependency between the attributes of the data set. In this paper, we combin...
Ting Wang
133
Voted
CPM
2006
Springer
182views Combinatorics» more  CPM 2006»
15 years 5 months ago
Theoretical and Practical Improvements on the RMQ-Problem, with Applications to LCA and LCE
The Range-Minimum-Query-Problem is to preprocess an array such that the position of the minimum element between two specified indices can be obtained efficiently. We present a dire...
Johannes Fischer, Volker Heun
169
Voted
WMC
2004
224views ECommerce» more  WMC 2004»
15 years 3 months ago
Evaluation Framework for a Mobile Marketing Application in 3rd Generation Networks
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
Franz Lehner, Eva-Maria Sperger, Holger Nösek...
115
Voted
ECCV
2010
Springer
15 years 3 months ago
Self-Adapting Feature Layers
Abstract. This paper presents a new approach for fitting a 3D morphable model to images of faces, using self-adapting feature layers (SAFL). The algorithm integrates feature detect...
102
Voted
SIAMSC
2008
191views more  SIAMSC 2008»
15 years 1 months ago
ORBIT: Optimization by Radial Basis Function Interpolation in Trust-Regions
Abstract. We present a new derivative-free algorithm, ORBIT, for unconstrained local optimization of computationally expensive functions. A trust-region framework using interpolati...
Stefan M. Wild, Rommel G. Regis, Christine A. Shoe...