Sciweavers

999 search results - page 62 / 200
» Warping the time on data streams
Sort
View
ICIP
2006
IEEE
16 years 2 months ago
Detecting Occlusion for Hidden Markov Modeled Shapes
In this paper, we present a novel occlusion detection scheme for hidden Markov modeled shapes. First, hidden Markov model (HMM) is built using multiple examples of the shape. A re...
Ninad Thakoor, Sungyong Jung, Jean Gao
149
Voted
ARCS
2012
Springer
13 years 8 months ago
Improving Cache Locality for Ray Casting with CUDA
Abstract: In this paper, we present an acceleration method for texture-based ray casting on the compute unified device architecture (CUDA) compatible graphics processing unit (GPU...
Yuki Sugimoto, Fumihiko Ino, Kenichi Hagihara
134
Voted
TDSC
2011
14 years 7 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
DEXA
2009
Springer
88views Database» more  DEXA 2009»
15 years 4 months ago
Significance-Based Failure and Interference Detection in Data Streams
Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of inte...
Nickolas J. G. Falkner, Quan Z. Sheng
95
Voted
ICDM
2007
IEEE
158views Data Mining» more  ICDM 2007»
15 years 7 months ago
On Appropriate Assumptions to Mine Data Streams: Analysis and Practice
Recent years have witnessed an increasing number of studies in stream mining, which aim at building an accurate model for continuously arriving data. Somehow most existing work ma...
Jing Gao, Wei Fan, Jiawei Han