Sciweavers

2990 search results - page 529 / 598
» Thresholding for Change Detection
Sort
View
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 9 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
CN
2007
137views more  CN 2007»
13 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IJCV
2006
117views more  IJCV 2006»
13 years 9 months ago
Programmable Imaging: Towards a Flexible Camera
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric an...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
CORR
2007
Springer
137views Education» more  CORR 2007»
13 years 9 months ago
Cross-Matching Multiple Spatial Observations and Dealing with Missing Data
: Cross-match spatially clusters and organizes several astronomical point-source measurements from one or more surveys. Ideally, each object would be found in each survey. Unfortun...
Jim Gray, Alexander S. Szalay, Tamas Budavari, Rob...
JCP
2006
100views more  JCP 2006»
13 years 9 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah