Sciweavers

67 search results - page 11 / 14
» Search for Patterns in Compressed Time Series
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
14 years 1 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
WWW
2011
ACM
13 years 2 months ago
A word at a time: computing word relatedness using temporal semantic analysis
Computing the degree of semantic relatedness of words is a key functionality of many language applications such as search, clustering, and disambiguation. Previous approaches to c...
Kira Radinsky, Eugene Agichtein, Evgeniy Gabrilovi...
EVOW
2009
Springer
13 years 11 months ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
KDD
2004
ACM
211views Data Mining» more  KDD 2004»
14 years 7 months ago
Towards parameter-free data mining
Most data mining algorithms require the setting of many input parameters. Two main dangers of working with parameter-laden algorithms are the following. First, incorrect settings ...
Eamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) R...
CPM
2005
Springer
101views Combinatorics» more  CPM 2005»
14 years 28 days ago
Succinct Suffix Arrays Based on Run-Length Encoding
A succinct full-text self-index is a data structure built on a text T = t1t2 . . . tn, which takes little space (ideally close to that of the compressed text), permits efficient se...
Veli Mäkinen, Gonzalo Navarro