Sciweavers

1356 search results - page 228 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
CGF
2008
235views more  CGF 2008»
13 years 8 months ago
Free Form Incident Light Fields
This paper presents methods for photo-realistic rendering using strongly spatially variant illumination captured from real scenes. The illumination is captured along arbitrary pat...
Jonas Unger, Stefan Gustavson, P. Larsson, Anders ...
ICCS
2009
Springer
13 years 5 months ago
Evaluating the Jaccard-Tanimoto Index on Multi-core Architectures
The Jaccard/Tanimoto coefficient is an important workload, used in a large variety of problems including drug design fingerprinting, clustering analysis, similarity web searching a...
Vipin Sachdeva, Douglas M. Freimuth, Chris Mueller
BALT
2006
13 years 11 months ago
Introducing Softness into Inductive Queries on String Databases
In many application domains (e.g., WWW mining, molecular biology), large string datasets are available and yet under-exploited. The inductive database framework assumes that both s...
Ieva Mitasiunaite, Jean-François Boulicaut
CSB
2003
IEEE
14 years 1 months ago
LOGOS: a modular Bayesian model for de novo motif detection
The complexity of the global organization and internal structures of motifs in higher eukaryotic organisms raises significant challenges for motif detection techniques. To achiev...
Eric P. Xing, Wei Wu, Michael I. Jordan, Richard M...
VLDB
2004
ACM
120views Database» more  VLDB 2004»
14 years 1 months ago
Relational link-based ranking
Link analysis methods show that the interconnections between web pages have lots of valuable information. The link analysis methods are, however, inherently oriented towards analy...
Floris Geerts, Heikki Mannila, Evimaria Terzi