Sciweavers

762 search results - page 147 / 153
» Two Approaches to Merging Knowledge Bases
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
GIR
2006
ACM
14 years 2 months ago
Detecting Geographical Serving Area of Web Resources
Most human activities occur around where the user is physically located. Knowing the geographical serving area of web resources, therefore, is very important for many web applicat...
Qi Zhang, Xing Xie, Lee Wang, Lihua Yue, Wei-Ying ...
MSWIM
2009
ACM
14 years 3 months ago
Directional neighbor discovery in 60 GHz indoor wireless networks
The unlicensed 60 GHz band brings the promise of multi-gigabit data rates to support new applications such as high definition video over wireless links. Signal propagation in the...
Jianxia Ning, Tae-Suk Kim, Srikanth V. Krishnamurt...
ECCV
2000
Springer
14 years 10 months ago
Colour by Correlation in a Three-Dimensional Colour Space
We improve the promising Colour by Correlation method for computational colour constancy by modifying it to work in a three dimensional colour space. The previous version of the al...
Kobus Barnard, Lindsay Martin, Brian V. Funt
SIGMOD
2008
ACM
142views Database» more  SIGMOD 2008»
14 years 8 months ago
Cost-based variable-length-gram selection for string collections to support approximate queries efficiently
Approximate queries on a collection of strings are important in many applications such as record linkage, spell checking, and Web search, where inconsistencies and errors exist in...
Xiaochun Yang, Bin Wang, Chen Li