Sciweavers

820 search results - page 45 / 164
» Finding low-utility data structures
Sort
View
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 8 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
VL
1998
IEEE
116views Visual Languages» more  VL 1998»
14 years 29 days ago
Programming Web-Based Applications within a Data-Flow VL
This paper shows how a general purpose data flow visual programming environment can be effectively used to find, collect and manipulate information available on the web. The discu...
Roberto Idini, Mauro Mosconi, Marco Porta
JVCA
2008
72views more  JVCA 2008»
13 years 8 months ago
Robust deformation capture from temporal range data for surface rendering
Imagine an object such as a paper sheet being waved in front of some sensor. Reconstructing the time-varying 3D shape of the object finds direct applications in computer animation...
Umberto Castellani, Vincent Gay-Bellile, Adrien Ba...
WEBI
2010
Springer
13 years 6 months ago
Discovering Research Communities by Clustering Bibliographical Data
Today's world is characterized by the multiplicity of interconnections through many types of links between the people, that is why mining social networks appears to be an impo...
Fabrice Muhlenbach, Stéphane Lallich
EOR
2006
86views more  EOR 2006»
13 years 8 months ago
Minimum-distance controlled perturbation methods for large-scale tabular data protection
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...
Jordi Castro