Sciweavers

1642 search results - page 267 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
176
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
PR
2002
88views more  PR 2002»
15 years 4 months ago
Indexing chromatic and achromatic patterns for content-based colour image retrieval
In this paper, we present a method to represent achromatic and chromatic image signals independently for content-based image indexing and retrieval for image database applications...
Guoping Qiu
ICML
2005
IEEE
16 years 5 months ago
Bayesian hierarchical clustering
We present a novel algorithm for agglomerative hierarchical clustering based on evaluating marginal likelihoods of a probabilistic model. This algorithm has several advantages ove...
Katherine A. Heller, Zoubin Ghahramani
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
16 years 4 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...
139
Voted
CIVR
2009
Springer
257views Image Analysis» more  CIVR 2009»
15 years 11 months ago
Trajectory-based handball video understanding
This paper presents a content-based approach for understanding handball videos. Tracked players are characterized by their 2D trajectories in the court plane. The trajectories and...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...