Sciweavers

2075 search results - page 166 / 415
» Usage-based Object Similarity
Sort
View
ISMIS
2005
Springer
15 years 9 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
112
Voted
ECOOP
2000
Springer
15 years 8 months ago
On Inner Classes
Inner classes in object-oriented languages play a role similar to nested function definitions in functional languages, allowing an object to export other objects with direct acces...
Atsushi Igarashi, Benjamin C. Pierce
SBBD
2004
106views Database» more  SBBD 2004»
15 years 5 months ago
Twisting the Metric Space to Achieve Better Metric Trees
In order to index text fields in XML databases for similarity queries, M-Trees may be applied. However, some datasets experiments using M-Trees for this purpose resulted in low qu...
César Feijó Nadvorny, Carlos A. Heus...
CVIU
2008
151views more  CVIU 2008»
15 years 4 months ago
Accurate and precise 2D-3D registration based on X-ray intensity
This paper addresses the problem of estimating the 3D rigid pose of an object from its digitized X-ray projection. We considered the cases of homogeneous (CAD models) and inhomoge...
Souha Aouadi, Laurent Sarry
JMLR
2006
96views more  JMLR 2006»
15 years 4 months ago
Rearrangement Clustering: Pitfalls, Remedies, and Applications
Given a matrix of values in which the rows correspond to objects and the columns correspond to features of the objects, rearrangement clustering is the problem of rearranging the ...
Sharlee Climer, Weixiong Zhang