Sciweavers

176 search results - page 24 / 36
» Crime Data Mining: A General Framework and Some Examples
Sort
View
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
13 years 10 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
PROFES
2005
Springer
14 years 27 days ago
Mega Software Engineering
Abstract. In various fields of computer science, rapidly growing hardware power, such as high-speed network, high-performance CPU, huge disk capacity, and large memory space, has ...
Katsuro Inoue, Pankaj K. Garg, Hajimu Iida, Ken-ic...
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 7 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
TSP
2011
106views more  TSP 2011»
13 years 2 months ago
Extended Target Tracking Using Polynomials With Applications to Road-Map Estimation
—This paper presents an extended target tracking framework which uses polynomials in order to model extended objects in the scene of interest from imagery sensor data. State spac...
Christian Lundquist, Umut Orguner, Fredrik Gustafs...
GI
1999
Springer
13 years 11 months ago
Caching in Networks
d Abstract) Friedhelm Meyer auf der Heide   Berthold V¨ocking† Matthias Westermann   We present a general framework for the development of online algorithms for data manageme...
Matthias Westermann