Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
This tutorial presents an overview of the data management issues faced by computer games today. While many games do not use databases directly, they still have to process large am...
Alan J. Demers, Johannes Gehrke, Christoph Koch, B...
The Protein Information Resource (PIR) serves as an integrated public resource of functional annotation of protein data to support genomic/proteomic research and scientific discov...
Cathy H. Wu, Hongzhan Huang, Leslie Arminski, Jorg...
All surfaces can be classified by the conformal equivalence
relation. Conformal invariants, which are shape indices
that can be defined intrinsically on a surface, may
be used t...
Paul M. Thompson, Tony F. Chan, Xianfeng Gu, Yalin...
Manually labeled landmark sets are often required as in-
puts for landmark-based image registration. Identifying an
optimal subset of landmarks from a training dataset may be
us...
Anand A. Joshi, David W. Shattuck, Dimitrios Panta...