Sciweavers

1636 search results - page 114 / 328
» Detecting similar software applications
Sort
View
115
Voted
CN
2002
96views more  CN 2002»
15 years 4 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 10 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
153
Voted
ISD
1999
Springer
213views Database» more  ISD 1999»
15 years 8 months ago
A Probabilistic Approach to Environmental Change Detection with Area-Class Map Data
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Robust Face Detection Using the Hausdorff Distance
Abstract. The localization of human faces in digital images is a fundamental step in the process of face recognition. This paper presents a shape comparison approach to achieve fas...
Oliver Jesorsky, Klaus J. Kirchberg, Robert Frisch...
134
Voted
PCM
2004
Springer
107views Multimedia» more  PCM 2004»
15 years 10 months ago
Automatic Peak Number Detection in Image Symmetry Analysis
Abstract. In repeated pattern analysis, peak number detection in autocorrelation is of key importance, which subsequently determines the correctness of the constructed lattice. Pre...
Jingrui He, Mingjing Li, HongJiang Zhang, Hanghang...