Sciweavers

648 search results - page 86 / 130
» The power of feature clustering: An application to object de...
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
VR
2010
IEEE
108views Virtual Reality» more  VR 2010»
13 years 7 months ago
Twinkle: Interacting with physical surfaces using handheld projector
We propose a novel interface called Twinkle for interacting with an arbitrary physical surface using a handheld projector and a camera. When a user flashes a projection light on ...
Takumi Yoshida, Yuki Hirobe, Hideaki Nii, Naoki Ka...
TIP
2002
131views more  TIP 2002»
13 years 8 months ago
Optimal edge-based shape detection
Abstract--We propose an approach to accurately detecting twodimensional (2-D) shapes. The cross section of the shape boundary is modeled as a step function. We first derive a one-d...
Hankyu Moon, Rama Chellappa, Azriel Rosenfeld
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 10 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin
CASES
2003
ACM
14 years 10 days ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna