Sciweavers

762 search results - page 53 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
MMM
2005
Springer
202views Multimedia» more  MMM 2005»
14 years 2 months ago
Image Mining and Retrieval Using Hierarchical Support Vector Machines
For some time now, image retrieval approaches have been developed that use low-level features, such as colour histograms, edge distributions and texture measures. What has been la...
Ross Brown, Binh Pham
ECML
2005
Springer
14 years 2 months ago
Fitting the Smallest Enclosing Bregman Ball
Finding a point which minimizes the maximal distortion with respect to a dataset is an important estimation problem that has recently received growing attentions in machine learnin...
Richard Nock, Frank Nielsen
ESEM
2008
ACM
13 years 10 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
ICIP
2005
IEEE
14 years 10 months ago
The M-term pursuit for image representation and progressive compression
This paper introduces a sparse signal representation algorithm in redundant dictionaries, called the M-Term Pursuit (MTP), with an application to image representation and scalable ...
Adel Rahmoune, Pierre Vandergheynst, Pascal Frossa...
VLDB
2007
ACM
129views Database» more  VLDB 2007»
14 years 8 months ago
Efficient Skyline Computation over Low-Cardinality Domains
Current skyline evaluation techniques follow a common paradigm that eliminates data elements from skyline consideration by finding other elements in the dataset that dominate them...
Michael D. Morse, Jignesh M. Patel, H. V. Jagadish