Sciweavers

372 search results - page 64 / 75
» Comparative Testing of Face Detection Algorithms
Sort
View
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 7 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
JCM
2006
118views more  JCM 2006»
13 years 7 months ago
Joint Optimization of Local and Fusion Rules in a Decentralized Sensor Network
Decentralized sensor networks are collections of individual local sensors that observe a common phenomenon, quantize their observations, and send this quantized information to a ce...
Nithya Gnanapandithan, Balasubramaniam Natarajan
ICASSP
2010
IEEE
13 years 7 months ago
Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity
We extensively evaluated a data hiding algorithm for stereo audio signals which embeds data using the polarity of the echoes added to the high-frequency channels, which we have pr...
Kazuhiro Kondo
SIGSOFT
2007
ACM
14 years 8 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
BMCBI
2010
101views more  BMCBI 2010»
13 years 7 months ago
Enrichment of homologs in insignificant BLAST hits by co-complex network alignment
Background: Homology is a crucial concept in comparative genomics. The algorithm probably most widely used for homology detection in comparative genomics, is BLAST. Usually a stri...
Like Fokkens, Sandra M. C. Botelho, Jos Boekhorst,...