Sciweavers

892 search results - page 111 / 179
» On Feature Selection through Clustering
Sort
View
ICIP
2010
IEEE
13 years 5 months ago
Rotation robust detection of copy-move forgery
Copy-move tampering is a common type of image synthesizing, where a part of an image is copied and pasted to another place to add or remove an object. In this paper, an efficient ...
Weihai Li, Nenghai Yu
CSMR
2007
IEEE
14 years 2 months ago
An approach for mining services in database oriented applications
The diffusion of service oriented architectures is slowed down by the lack of enough services available for satisfying service integrator needs. Nevertheless, many features desire...
Concettina Del Grosso, Massimiliano Di Penta, Igna...
ISCC
2006
IEEE
123views Communications» more  ISCC 2006»
14 years 1 months ago
Similarity Search in a Hybrid Overlay P2P Network
P2P systems are increasingly used to discover and share various data between users. The performance of a P2P based information retrieval system is determined by the efficiency of...
Mouna Kacimi, Kokou Yétongnon
KES
2004
Springer
14 years 1 months ago
Analyzing the Temporal Sequences for Text Categorization
– This paper describes a text categorization approach that is based on a combination of a newly designed text representation with a kNN classifier. The new text document represen...
Xiao Luo, A. Nur Zincir-Heywood
LCPC
2009
Springer
14 years 11 days ago
MIMD Interpretation on a GPU
Programming heterogeneous parallel computer systems is notoriously difficult, but MIMD models have proven to be portable across multi-core processors, clusters, and massively paral...
Henry G. Dietz, B. Dalton Young