Sciweavers

3651 search results - page 645 / 731
» Data Mining for Security Applications
Sort
View
GLOBECOM
2009
IEEE
14 years 6 months ago
Rapidly-Deployable Mesh Network Testbed
—This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and mili...
Michael R. Souryal, Andreas Wapf, Nader Moayeri
CIKM
2009
Springer
14 years 5 months ago
Role of weak ties in link prediction of complex networks
Plenty of algorithms for link prediction have been proposed and were applied to various real networks. Among these works, the weights of links are rarely taken into account. In th...
Linyuan Lu, Tao Zhou
FQAS
2009
Springer
157views Database» more  FQAS 2009»
14 years 5 months ago
On Fuzzy vs. Metric Similarity Search in Complex Databases
Abstract. The task of similarity search is widely used in various areas of computing, including multimedia databases, data mining, bioinformatics, social networks, etc. For a long ...
Alan Eckhardt, Tomás Skopal, Peter Vojt&aac...
IEAAIE
2009
Springer
14 years 5 months ago
Robust Singular Spectrum Transform
Change Point Discovery is a basic algorithm needed in many time series mining applications including rule discovery, motif discovery, casual analysis, etc. Several techniques for c...
Yasser F. O. Mohammad, Toyoaki Nishida
PETRA
2009
ACM
14 years 5 months ago
Towards automated large vocabulary gesture search
This paper describes work towards designing a computer vision system for helping users look up the meaning of a sign. Sign lookup is treated as a video database retrieval problem....
Alexandra Stefan, Haijing Wang, Vassilis Athitsos