Sciweavers

1128 search results - page 77 / 226
» Structuring anonymity metrics
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Full search content independent block matching based on the fast Fourier transform
In this paper, we present a new algorithm for solving the block matching problem which is independent of image content and is faster than other full-search methods. The method emp...
Mark S. Drew, Steven L. Kilthau, Torsten Möll...
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
14 years 9 months ago
Efficient Evaluation of All-Nearest-Neighbor Queries
The All Nearest Neighbor (ANN) operation is a commonly used primitive for analyzing large multi-dimensional datasets. Since computing ANN is very expensive, in previous works R*-t...
Yun Chen, Jignesh M. Patel
DAC
2008
ACM
14 years 8 months ago
Functional test selection based on unsupervised support vector analysis
Extensive software-based simulation continues to be the mainstream methodology for functional verification of designs. To optimize the use of limited simulation resources, coverag...
Onur Guzey, Li-C. Wang, Jeremy R. Levitt, Harry Fo...
ICSE
2008
IEEE-ACM
14 years 8 months ago
A case study evaluation of maintainability and performance of persistency techniques
Efforts for software evolution supersede any other part of the software life cycle. Technological decisions have a major impact on the maintainability, but are not well reflected ...
Thomas Goldschmidt, Ralf Reussner, Jochen Winzen
CIKM
2009
Springer
14 years 2 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu