Sciweavers

830 search results - page 79 / 166
» The Changing World of Outsourcing
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
13 years 10 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
MM
2010
ACM
196views Multimedia» more  MM 2010»
13 years 9 months ago
Non-parametric anomaly detection exploiting space-time features
In this paper a real-time anomaly detection system for video streams is proposed. Spatio-temporal features are exploited to capture scene dynamic statistics together with appearan...
Lorenzo Seidenari, Marco Bertini
DASFAA
2010
IEEE
191views Database» more  DASFAA 2010»
13 years 9 months ago
Answering Top-k Similar Region Queries
Abstract. Advances in web technology have given rise to new information retrieval applications. In this paper, we present a model for geographical region search and call this class...
Chang Sheng, Yu Zheng, Wynne Hsu, Mong-Li Lee, Xin...
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 8 months ago
Popularity, Novelty and Attention
We analyze the role that popularity and novelty play in attracting the attention of users to dynamic websites. We do so by determining the performance of three different strategie...
Fang Wu, Bernardo A. Huberman
AEI
2006
253views more  AEI 2006»
13 years 8 months ago
Computer based pedestrian landscape design using decision tree templates
Machine Learning algorithms can act as a valuable analytical tool in design research. In this paper, we demonstrate the application of a decision tree learning algorithm for desig...
Baranidharan Raman, Jody R. Naderi