Sciweavers

304 search results - page 40 / 61
» Comparing the Robustness of Expansion Techniques and Retriev...
Sort
View
KDD
2000
ACM
168views Data Mining» more  KDD 2000»
14 years 12 days ago
Scaling up dynamic time warping for datamining applications
There has been much recent interest in adapting data mining algorithms to time series databases. Most of these algorithms need to compare time series. Typically some variation of ...
Eamonn J. Keogh, Michael J. Pazzani
CLEF
2006
Springer
14 years 17 days ago
CLEF 2006: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2006 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual, and multilingual...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...
MM
2010
ACM
221views Multimedia» more  MM 2010»
13 years 9 months ago
Building book inventories using smartphones
Manual generation of a book inventory is time-consuming and tedious, while deployment of barcode and radio-frequency identification (RFID) management systems is costly and afforda...
David M. Chen, Sam S. Tsai, Bernd Girod, Cheng-Hsi...
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 8 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
SGP
2007
13 years 11 months ago
Reconstruction of deforming geometry from time-varying point clouds
In this paper, we describe a system for the reconstruction of deforming geometry from a time sequence of unstructured, noisy point clouds, as produced by recent real-time range sc...
Michael Wand, Philipp Jenke, Qi-Xing Huang, Martin...