Sciweavers

664 search results - page 106 / 133
» A Boosting Based Approach for Automatic Micro-calcification ...
Sort
View
JBCS
2010
85views more  JBCS 2010»
13 years 3 months ago
OWL schema matching
Schema matching is a fundamental issue to many database applications, such as query mediation and data warehousing. It becomes a challenge when different vocabularies are used to r...
Luiz André P. Paes Leme, Marco A. Casanova,...
VMV
2008
162views Visualization» more  VMV 2008»
13 years 10 months ago
Learning Distinctive Local Object Characteristics for 3D Shape Retrieval
While supervised learning approaches for 3D shape retrieval have been successfully used to incorporate human knowledge about object classes based on global shape features, the inc...
Raoul Wessel, Rafal Baranowski, Reinhard Klein
BPM
2010
Springer
163views Business» more  BPM 2010»
13 years 10 months ago
Self-adjusting Recommendations for People-Driven Ad-Hoc Processes
Abstract. A company's ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in peopledriven processes i...
Christoph Dorn, Thomas Burkhart, Dirk Werth, Schah...
ASUNAM
2010
IEEE
13 years 8 months ago
A Multiobjective and Evolutionary Clustering Method for Dynamic Networks
—The discovery of evolving communities in dynamic networks is an important research topic that poses challenging tasks. Previous evolutionary based clustering methods try to maxi...
Francesco Folino, Clara Pizzuti
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 5 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos