Sciweavers

431 search results - page 80 / 87
» We have always been transgenic
Sort
View
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
14 years 8 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...
VLDB
2001
ACM
146views Database» more  VLDB 2001»
14 years 7 months ago
Combining multi-visual features for efficient indexing in a large image database
Abstract. The optimized distance-based access methods currently available for multidimensional indexing in multimedia databases have been developed based on two major assumptions: ...
Anne H. H. Ngu, Quan Z. Sheng, Du Q. Huynh, Ron Le...
ISQED
2005
IEEE
81views Hardware» more  ISQED 2005»
14 years 1 months ago
Exact Algorithms for Coupling Capacitance Minimization by Adding One Metal Layer
Due to the rapid development of manufacturing process technology and tight marketing schedule, the chip design and manufacturing always work toward an integrated solution to achie...
Hua Xiang, Kai-Yuan Chao, Martin D. F. Wong
SIGIR
2005
ACM
14 years 1 months ago
A probabilistic model for retrospective news event detection
Retrospective news event detection (RED) is defined as the discovery of previously unidentified events in historical news corpus. Although both the contents and time information...
Zhiwei Li, Bin Wang, Mingjing Li, Wei-Ying Ma
ECCV
2010
Springer
14 years 23 days ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov