Sciweavers

1663 search results - page 171 / 333
» Computer Security in the Real World
Sort
View
142
Voted
WAIM
2007
Springer
15 years 10 months ago
Distributed, Hierarchical Clustering and Summarization in Sensor Networks
We propose DHCS, a method of distributed, hierarchical clustering and summarization for online data analysis and mining in sensor networks. Different from the acquisition and aggre...
Xiuli Ma, Shuangfeng Li, Qiong Luo, Dongqing Yang,...
3DPVT
2006
IEEE
216views Visualization» more  3DPVT 2006»
15 years 10 months ago
Shape Measure for Identifying Perceptually Informative Parts of 3D Objects
We propose a mathematical approach for quantifying shape complexity of 3D surfaces based on perceptual principles of visual saliency. Our curvature variation measure (CVM), as a 3...
Sreenivas R. Sukumar, David Page, Andrei V. Gribok...
CIBCB
2006
IEEE
15 years 10 months ago
Visualization of Support Vector Machines with Unsupervised Learning
– The visualization of support vector machines in realistic settings is a difficult problem due to the high dimensionality of the typical datasets involved. However, such visuali...
Lutz Hamel
ICDM
2006
IEEE
110views Data Mining» more  ICDM 2006»
15 years 10 months ago
A mining method of communities keeping tacit knowledge
The research community plays a very important role in holding valuable scientific knowledge. The authors propose a community mining system which helps to find communities of res...
Ryutaro Ichise, Hideaki Takeda, Satoshi Kouno, Tai...
158
Voted
ICRA
2006
IEEE
144views Robotics» more  ICRA 2006»
15 years 10 months ago
Adapting Probabilistic Roadmaps to Handle Uncertain Maps
Abstract— Randomized motion planning techniques are responsible for many of the recent successes in robot control. However, most motion planning algorithms assume perfect and com...
Patrycja E. Missiuro, Nicholas Roy