Sciweavers

205 search results - page 23 / 41
» A research demonstration of code bubbles
Sort
View
SDM
2012
SIAM
297views Data Mining» more  SDM 2012»
11 years 11 months ago
A Flexible Open-Source Toolbox for Scalable Complex Graph Analysis
The Knowledge Discovery Toolbox (KDT) enables domain experts to perform complex analyses of huge datasets on supercomputers using a high-level language without grappling with the ...
Adam Lugowski, David M. Alber, Aydin Buluç,...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
14 years 1 months ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant
CVPR
2010
IEEE
14 years 5 months ago
Surface Extraction from Binary Volumes with Higher-Order Smoothness
A number of 3D shape reconstruction algorithms, in particular 3D image segmentation methods, produce their results in the form of binary volumes, where a binary value indicates whe...
Victor Lempitsky
IWPC
2009
IEEE
14 years 3 months ago
Standing on the shoulders of giants - A data fusion approach to design pattern detection
Identification of design patterns can deliver important information to designers. Therefore, automated design pattern detection (DPD) is highly desirable when it comes to underst...
Günter Kniesel, Alexander Binun