Sciweavers

1595 search results - page 289 / 319
» A hierarchical clustering algorithm based on the Hungarian m...
Sort
View
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 10 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
ICPR
2010
IEEE
13 years 8 months ago
Unsupervised Image Retrieval with Similar Lighting Conditions
In this work a new method to retrieve images with similar lighting conditions is presented. It is based on automatic clustering and automatic indexing. Our proposal belongs to Con...
J. Felix Serrano, Carlos Avilés, Humberto S...
ESTIMEDIA
2003
Springer
14 years 3 months ago
Perception Coprocessors for Embedded Systems
Recognizing speech, gestures, and visual features are important interface capabilities for embedded mobile systems. Perception algorithms have many traits in common with more conv...
Binu K. Mathew, Al Davis, Ali Ibrahim
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 10 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
BMCBI
2010
102views more  BMCBI 2010»
13 years 10 months ago
Identification of recurrent regions of copy-number variants across multiple individuals
Background: Algorithms and software for CNV detection have been developed, but they detect the CNV regions sample-by-sample with individual-specific breakpoints, while common CNV ...
Teo Shu Mei, Agus Salim, Stefano Calza, Ku Chee Se...