Sciweavers

2144 search results - page 298 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
KDD
2006
ACM
139views Data Mining» more  KDD 2006»
16 years 5 months ago
Generating semantic annotations for frequent patterns with context analysis
As a fundamental data mining task, frequent pattern mining has widespread applications in many different domains. Research in frequent pattern mining has so far mostly focused on ...
Qiaozhu Mei, Dong Xin, Hong Cheng, Jiawei Han, Che...
ICDE
2007
IEEE
176views Database» more  ICDE 2007»
15 years 11 months ago
Finding Important People in Large News Video Databases Using Multimodal and Clustering Analysis
The wide availability of large scale databases requires more efficient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ļ¬...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
138
Voted
TSE
1998
115views more  TSE 1998»
15 years 4 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
TIP
2010
107views more  TIP 2010»
14 years 11 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
164
Voted
ICS
2005
Tsinghua U.
15 years 10 months ago
The implications of working set analysis on supercomputing memory hierarchy design
Supercomputer architects strive to maximize the performance of scientific applications. Unfortunately, the large, unwieldy nature of most scientific applications has lead to the...
Richard C. Murphy, Arun Rodrigues, Peter M. Kogge,...