Sciweavers

276 search results - page 50 / 56
» Performance Evaluation of Some Clustering Algorithms and Val...
Sort
View
P2P
2008
IEEE
14 years 1 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
IMC
2006
ACM
14 years 1 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
ECCV
2010
Springer
14 years 18 days ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
CVRMED
1997
Springer
13 years 11 months ago
Rigid registration of CT, MR and cryosection images using a GLCM framework
The majority of the available rigid registration measures are based on a 2-dimensional histogram of corresponding grey-values in the registered images. This paper shows that these ...
Morten Bro-Nielsen
BMCBI
2010
155views more  BMCBI 2010»
13 years 7 months ago
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
Background: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of...
Fan Shi, Christopher Leckie, Geoff MacIntyre, Izha...