Sciweavers

2050 search results - page 393 / 410
» constraints 2010
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 6 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Today...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
MIAR
2010
IEEE
13 years 6 months ago
Computational Decision Support for Percutaneous Aortic Valve Implantation
Valve replacement is the most common therapy for diseased aortic valves. Percutaneous approaches are becoming increasingly popular, due to reduced procedural complications and lowe...
Ingmar Voigt, Razvan Ioan Ionasec, Bogdan Georgesc...
P2P
2010
IEEE
207views Communications» more  P2P 2010»
13 years 6 months ago
Local Access to Sparse and Large Global Information in P2P Networks: A Case for Compressive Sensing
—In this paper we face the following problem: how to provide each peer local access to the full information (not just a summary) that is distributed over all edges of an overlay ...
Rossano Gaeta, Marco Grangetto, Matteo Sereno
PAA
2010
13 years 6 months ago
Exploiting visual and text features for direct marketing learning in time and space constrained domains
Traditionally, direct marketing companies have relied on pre-testing to select the best offers to send to their audiences. Companies systematically dispatch the offers under consid...
Sebastiano Battiato, Giovanni Maria Farinella, Gio...
PAMI
2010
168views more  PAMI 2010»
13 years 6 months ago
Surface-from-Gradients without Discrete Integrability Enforcement: A Gaussian Kernel Approach
—Representative surface reconstruction algorithms taking a gradient field as input enforces the integrability constraint in a discrete manner. While enforcing integrability allo...
Heung-Sun Ng, Tai-Pang Wu, Chi-Keung Tang