Sciweavers

1850 search results - page 145 / 370
» classification 2010
Sort
View
143
Voted
ENVSOFT
2008
141views more  ENVSOFT 2008»
15 years 4 months ago
Geomorphometric landscape analysis using a semi-automated GIS-approach
This paper presents LANDFORM, a customized GIS application for semi-automated classification of landform elements, based on topographic attributes like curvature or elevation perc...
Bernhard Klingseisen, Graciela Metternicht, Gernot...
ER
2010
Springer
129views Database» more  ER 2010»
15 years 2 months ago
SQOWL: Type Inference in an RDBMS
In this paper we describe a method to perform type inference over data stored in an RDBMS, where rules over the data are specified using OWLDL. Since OWL-DL is an implementation of...
Peter McBrien, Nikos Rizopoulos, Andrew Smith
GRC
2010
IEEE
15 years 2 months ago
A Comparative Study of Threshold-Based Feature Selection Techniques
Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality clas...
Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hu...
ICPR
2010
IEEE
15 years 2 months ago
Hierarchical Human Action Recognition by Normalized-Polar Histogram
This paper proposes a novel human action recognition approach which represents each video sequence by a cumulative skeletonized images (called CSI) in one action cycle. Normalized-...
Maryam Ziaeefard, Hossein Ebrahimnezhad
CORR
2010
Springer
286views Education» more  CORR 2010»
15 years 1 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos