Sciweavers

1291 search results - page 223 / 259
» Intrusion Detection for Distributed Applications
Sort
View
GIS
2010
ACM
13 years 6 months ago
Energy-efficient processing of spatio-temporal queries in wireless sensor networks
Research on Moving Object Databases (MOD) has resulted in sophisticated query mechanisms for moving objects and regions. Wireless Sensor Networks (WSN) support a wide range of app...
Markus Bestehorn, Klemens Böhm, Erik Buchmann...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 11 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
CVPR
2001
IEEE
14 years 10 months ago
Texture Replacement in Real Images
Texture replacement in real images has many applications, such as interior design, digital movie making and computer graphics. The goal is to replace some specified texture patter...
Yanghai Tsin, Yanxi Liu, Visvanathan Ramesh
ECCV
2006
Springer
14 years 10 months ago
Robust Visual Tracking for Multiple Targets
We address the problem of robust multi-target tracking within the application of hockey player tracking. The particle filter technique is adopted and modified to fit into the multi...
Yizheng Cai, Nando de Freitas, James J. Little
RECOMB
2001
Springer
14 years 9 months ago
Context-specific Bayesian clustering for gene expression data
The recent growth in genomic data and measurements of genome-wide expression patterns allows us to apply computational tools to examine gene regulation by transcription factors. I...
Yoseph Barash, Nir Friedman