Sciweavers

1172 search results - page 202 / 235
» Using Small Screen Space More Efficiently
Sort
View
CCS
2009
ACM
15 years 10 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
CAIP
2007
Springer
143views Image Analysis» more  CAIP 2007»
15 years 9 months ago
A Level Set Bridging Force for the Segmentation of Dendritic Spines
The paper focusses on a group of segmentation problems dealing with 3D data sets showing thin objects that appear disconnected in the data due to partial volume effects or a large...
Karsten Rink, Klaus D. Tönnies
CIKM
2010
Springer
15 years 21 days ago
Regularization and feature selection for networked features
In the standard formalization of supervised learning problems, a datum is represented as a vector of features without prior knowledge about relationships among features. However, ...
Hongliang Fei, Brian Quanz, Jun Huan
CAD
2005
Springer
15 years 3 months ago
Optimizing the topological and combinatorial complexity of isosurfaces
Since the publication of the original Marching Cubes algorithm, numerous variations have been proposed for guaranteeing water-tight constructions of triangulated approximations of...
Carlos Andújar, Pere Brunet, Antoni Chica, ...
KDD
2004
ACM
138views Data Mining» more  KDD 2004»
16 years 3 months ago
IDR/QR: an incremental dimension reduction algorithm via QR decomposition
Dimension reduction is a critical data preprocessing step for many database and data mining applications, such as efficient storage and retrieval of high-dimensional data. In the ...
Jieping Ye, Qi Li, Hui Xiong, Haesun Park, Ravi Ja...