Sciweavers

449 search results - page 50 / 90
» Efficient use of local edge histogram descriptor
Sort
View
SISAP
2010
IEEE
259views Data Mining» more  SISAP 2010»
13 years 6 months ago
kNN based image classification relying on local feature similarity
In this paper, we propose a novel image classification approach, derived from the kNN classification strategy, that is particularly suited to be used when classifying images descr...
Giuseppe Amato, Fabrizio Falchi
ISSTA
2009
ACM
14 years 3 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
ECCV
2000
Springer
14 years 10 months ago
Significantly Different Textures: A Computational Model of Pre-attentive Texture Segmentation
Abstract. Recent human vision research [1] suggests modelling preattentive texture segmentation by taking a set of feature samples from a local region on each side of a hypothesize...
Ruth Rosenholz
KDD
2008
ACM
164views Data Mining» more  KDD 2008»
14 years 9 months ago
Microscopic evolution of social networks
We present a detailed study of network evolution by analyzing four large online social networks with full temporal information about node and edge arrivals. For the first time at ...
Jure Leskovec, Lars Backstrom, Ravi Kumar, Andrew ...
IWMM
2010
Springer
125views Hardware» more  IWMM 2010»
13 years 10 months ago
Efficient memory shadowing for 64-bit architectures
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and s...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe