Sciweavers

1929 search results - page 298 / 386
» An Approach to Limit the Wynot Problem
Sort
View
CISS
2008
IEEE
14 years 3 months ago
1-Bit compressive sensing
Abstract—Compressive sensing is a new signal acquisition technology with the potential to reduce the number of measurements required to acquire signals that are sparse or compres...
Petros Boufounos, Richard G. Baraniuk
CRV
2008
IEEE
205views Robotics» more  CRV 2008»
14 years 3 months ago
Accurate Boundary Localization using Dynamic Programming on Snakes
The extraction of contours using deformable models, such as snakes, is a problem of great interest in computer vision, particular in areas of medical imaging and tracking. Snakes ...
Akshaya Kumar Mishra, Paul W. Fieguth, David A. Cl...
HASE
2008
IEEE
14 years 3 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICDM
2008
IEEE
147views Data Mining» more  ICDM 2008»
14 years 3 months ago
Clustering Documents with Active Learning Using Wikipedia
Wikipedia has been applied as a background knowledge base to various text mining problems, but very few attempts have been made to utilize it for document clustering. In this pape...
Anna Huang, David N. Milne, Eibe Frank, Ian H. Wit...
ADMA
2008
Springer
123views Data Mining» more  ADMA 2008»
14 years 3 months ago
Supporting Customer Retention through Real-Time Monitoring of Individual Web Usage
Customer retention is crucial for any company relying on a regular client base. One way to approach this problem is to analyse actual user behaviour and take proper actions based o...
Peter Hofgesang, Jan Peter Patist