Sciweavers

729 search results - page 124 / 146
» A Transitive Closure Based Algorithm for Test Generation
Sort
View
ISMIS
2005
Springer
14 years 1 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
PAKDD
2010
ACM
146views Data Mining» more  PAKDD 2010»
14 years 20 days ago
Mining Antagonistic Communities from Social Networks
During social interactions in a community, there are often sub-communities that behave in opposite manner. These antagonistic sub-communities could represent groups of people with ...
Kuan Zhang, David Lo, Ee-Peng Lim
CG
2006
Springer
13 years 8 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
IAJIT
2010
123views more  IAJIT 2010»
13 years 6 months ago
Implementation of a speech coding strategy for auditory implants
: In this paper we present the conception and the implementation of a speech processing interface for cochlea prosthesis. This module is based on a numerical speech processing algo...
Lamia Bouafif, Kais Ouni, Noureddine Ellouze
PVLDB
2010
135views more  PVLDB 2010»
13 years 6 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...