Sciweavers

1056 search results - page 150 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
SIGKDD
2008
87views more  SIGKDD 2008»
13 years 10 months ago
Blogosphere: research issues, tools, and applications
Weblogs, or Blogs, have facilitated people to express their thoughts, voice their opinions, and share their experiences and ideas. Individuals experience a sense of community, a f...
Nitin Agarwal, Huan Liu
IJDE
2007
110views more  IJDE 2007»
13 years 10 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers
SIGPRO
2008
151views more  SIGPRO 2008»
13 years 10 months ago
An adaptive penalized maximum likelihood algorithm
The LMS algorithm is one of the most popular learning algorithms for identifying an unknown system. Many variants of the algorithm have been developed based on different problem f...
Guang Deng, Wai-Yin Ng
TASE
2008
IEEE
13 years 10 months ago
Automated Planning and Optimization of Lumber Production Using Machine Vision and Computed Tomography
An automated system for planning and optimization of lumber production using Machine Vision and Computed Tomography (CT) is proposed. Cross-sectional CT images of hardwood logs are...
Suchendra M. Bhandarkar, Xingzhi Luo, Richard F. D...
TIFS
2008
179views more  TIFS 2008»
13 years 10 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...