Sciweavers

2990 search results - page 94 / 598
» Thresholding for Change Detection
Sort
View
97
Voted
AAAI
2006
15 years 4 months ago
Bayesian Reputation Modeling in E-Marketplaces Sensitive to Subjectivity, Deception and Change
We present a model for buying agents in e-marketplaces to interpret evaluations of sellers provided by other buying agents, known as advisors. The interpretation of seller evaluat...
Kevin Regan, Pascal Poupart, Robin Cohen
127
Voted
WMPI
2004
ACM
15 years 9 months ago
Selective main memory compression by identifying program phase changes
During a program’s runtime, the stack and data segments of the main memory often contain much redundancy, which makes them good candidates for compression. Compression and decomp...
Doron Nakar, Shlomo Weiss
108
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
215
Voted
ICDM
2005
IEEE
272views Data Mining» more  ICDM 2005»
15 years 9 months ago
Mining Patterns of Change in Remote Sensing Image Databases
Remote sensing image databases are the fastest growing archives of spatial information. However, we still have a limited capacity for extracting information from large remote sens...
Marcelino Pereira dos Santos Silva, Gilberto C&aci...
118
Voted
DOCENG
2008
ACM
15 years 5 months ago
Merging changes in XML documents using reliable context fingerprints
Different dialects of XML have emerged as ubiquitous document exchange formats. For effective collaboration based on such documents, the capability to propagate edit operations pe...
Sebastian Rönnau, Christian Pauli, Uwe M. Bor...