Sciweavers

244 search results - page 38 / 49
» Elsewhere
Sort
View
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 5 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
EDBT
2012
ACM
254views Database» more  EDBT 2012»
12 years 6 days ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
ECCV
2006
Springer
14 years 11 months ago
Machine Learning for High-Speed Corner Detection
Abstract Where feature points are used in real-time frame-rate applications, a high-speed feature detector is necessary. Feature detectors such as SIFT (DoG), Harris and SUSAN are ...
Edward Rosten, Tom Drummond
ICML
1998
IEEE
14 years 10 months ago
Q2: Memory-Based Active Learning for Optimizing Noisy Continuous Functions
This paper introduces a new algorithm, Q2, foroptimizingthe expected output ofamultiinput noisy continuous function. Q2 is designed to need only a few experiments, it avoids stron...
Andrew W. Moore, Jeff G. Schneider, Justin A. Boya...
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
14 years 10 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...