Sciweavers

1663 search results - page 253 / 333
» Computer Security in the Real World
Sort
View
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
16 years 4 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...
SDM
2009
SIAM
114views Data Mining» more  SDM 2009»
16 years 1 months ago
GAD: General Activity Detection for Fast Clustering on Large Data.
In this paper, we propose GAD (General Activity Detection) for fast clustering on large scale data. Within this framework we design a set of algorithms for different scenarios: (...
Jiawei Han, Liangliang Cao, Sangkyum Kim, Xin Jin,...
133
Voted
SDM
2009
SIAM
173views Data Mining» more  SDM 2009»
16 years 1 months ago
Discretized Spatio-Temporal Scan Window.
The focus of this paper is the discovery of anomalous spatio-temporal windows. We propose a Discretized SpatioTemporal Scan Window approach to address the question of how we can t...
Aryya Gangopadhyay, Seyed H. Mohammadi, Vandana Pu...
121
Voted
HRI
2010
ACM
15 years 10 months ago
Gracefully mitigating breakdowns in robotic services
— Robots that operate in the real world will make mistakes. Thus, those who design and build systems will need to understand how best to provide ways for robots to mitigate those...
Min Kyung Lee, Sara Kielser, Jodi Forlizzi, Siddha...
134
Voted
PERCOM
2009
ACM
15 years 10 months ago
A Mobile Product Recommendation System Interacting with Tagged Products
— This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation m...
Felix von Reischach, Florian Michahelles, Dominiqu...