Browsing Closed by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Feng, Y; Chi, L; Chi, H; Liu, C; Liu, Z (IEEE, 2012-01)
    A very promising idea for fast searching in time series databases is to map the time series into a representative space. In this paper, we propose an effective querying algorithm QoM (Querying on Motif) based on time series ...
  • Zhang, W; Lin, X; Cheema, MA; Zhang, Y; Wang, W (IEEE, 2010-01)
    K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over multi-valued objects. We aim to provide ...
  • Bernardo, DV; Chua, B; Hoang, DB (Research Publishing Services, 2009-01)
    This paper introduces a novel approach to a more practical Quantitative SRA. The approach formalized in this paper is based on the methods described in various risk assessment frameworks that were described by existing ...
  • Ying, M; Feng, Y; Yu, N (2013-01-29)
    Quantum cryptography has been extensively studied in the last twenty years, but information-flow security of quantum computing and communication systems has been almost untouched in the previous research. Duo to the essential ...
  • Liu, X; Li, J; Wang, L (Springer, 2008-01)
    Protein-protein interactions (PPIs) are one of the most important mechanisms in cellular processes. To model protein interaction sites, recent studies have suggested to find interacting protein group pairs from large PPI ...
  • Qin, L; Yu, JX; Chang, L; Tao, Y (IEEE, 2009-01)
    Keyword search on relational databases provides users with insights that they can not easily observe using the traditional RDBMS techniques. Here, an l-keyword query is specified by a set of l keywords, {k1, k2, middot ...
  • Yang, C; Liu, C; Zhang, X; Nepal, S; Chen, J (2013)
    Nowadays, we enter a new era of data explosion which introduces the new problems for big data processing. Current methods for querying streaming XML big data are mostly based on events filtering techniques. It is well known ...
  • Chang, L; Yu, JX; Qin, L (ACM, 2009-01)
    Twig queries have been extensively studied as a major fragment of XPATH queries to query XML data. In this paper, we study PXML-RANK query, (Q, k), which is to rank top-k probabilities of the answers of a twig query Q in ...
  • Agbinya, JI; Chaczko, ZC; Aboura, K (BroadBandCom '09, 2009-01)
    Electromagnetic Fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive mainly due to the scarcity of the data. We propose an architecture ...
  • Xie, B; Song, M; Mu, Y; Tao, D (Springer, 2010-01)
    Image retrieval on large-scale datasets is challenging. Current indexing schemes, such as k-d tree, suffer from the âcurse of dimensionalityâ . In addition, there is no principled approach to integrate various features ...
  • Tao, D; Tang, X (IEEE Computer Soc, 2004-01)
    Relevance feedback (RF) schemes based on support vector machine (SVM) have been widely used in content-based image retrieval. However, the performance of SVM based RF is often poor when the number of labeled positive ...
  • Shen, Yuzhong; Seevinck, Jennifer; Baydogan, Emre (IOS Press, 2006)
    Wound debridement refers to the removal of necrotic, devitalized, or contaminated tissue and/or foreign material to promote wound healing. Surgical debridement uses sharp instruments to cut dead tissue from a wound and it ...
  • Harbinson, D; Balsys, RJ; Suffern, KG (IEEE Computer Society, 2008-01)
  • Paisitkriangkra, S; Shen, C; Zhang, J (Institute of Electrical and Electronics Engineers, 2008-01-01)
    Techniques for detecting pedestrian in still images have attached considerable research interests due to its wide applications such as video surveillance and intelligent transportation systems. In this paper, we propose a ...
  • Abolhasan, M; Hagelstein, B (IEEE APCC Wireless Communication Systems (IEEE APCC), 2009-01)
    The proliferation of mesh or ad hoc network protocols has lead to a push for protocol standardisation. While there are a number of both open-source and proprietary mesh routing protocols being developed, there is only a ...
  • Prade, H; Richard, G (2010)
    By logical proportion, we mean a statement that expresses a semantical equivalence between two pairs of propositions. In these pairs, each element is compared to the other in terms of similarities and/or dissimilarities. ...
  • Agbinya, JI; Lee, V; Aboura, K; Chaczko, ZC (BroadBandCom '09, 2009-01)
    Radio frequency spectrum mapping allows determining the radio frequency signatures prevalent within an environment. We address the primary frequency bands used for cellular, wireless LAN, UMTS and ultra wideband communications. ...
  • Liang, J; Hua, J; Huang, M; Nguyen, Q; Simoff, SJ (ACM Press, 2012-01)
    Prior works on treemaps have mainly focused on developing the new layouts. The existing treemaps generated from various algorithms require careful examination on design parameter. However, current research does not provide ...
  • Krastev, BN; Lowe, DB; Murray, SJ (Kassel University Press, 2010-01)
    Release planning, the process of allocating particular features to specific system releases, is generally considered to be complex task where multiple factors need to be evaluated. Stakeholder involvement is a particular ...
  • Syed Mohamad, SM; McBride, TM (IEEE Computer Society Publications, 2008-01)
    We examine two active and popular open source products to observe whether or not open source software has a different defect arrival rate than software developed in-house. The evaluation used two common models of reliability ...