Browsing Journal Articles by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Journal Articles by Title

Sort by: Order: Results:

  • Zeng, X; Pei, J; Wang, K; Li, J (Springer London Ltd, 2009-01)
    While frequent pattern mining is fundamental for many data mining tasks, mining maximal frequent patterns efficiently is important in both theory and applications of frequent pattern mining. The fundamental challenge is ...
  • Yu, J; Tao, D; Rui, Y; Cheng, J (2013-02)
    Recently, we have witnessed a surge of interests of learning a low-dimensional subspace for scene classification. The existing methods do not perform well since they do not consider scenes' multiple features from different ...
  • Zhao, G; Zhao, G; Bryan, B; Bryan, B; King, D; King, D; Song, X; Song, X; Yu, Q; Yu, Q (Elsevier Sci LtdElsevier Sci Ltd, 2012-01)
    Spatial-temporal modelling of environmental systems such as agriculture, forestry, and water resources requires high resolution input data. Assembling and summarizing this data in the appropriate format for model input ...
  • Huang, Q; Tao, D; Li, X; Liew, AW (2012)
    The analysis of gene expression data obtained from microarray experiments is important for discovering the biological process of genes. Biclustering algorithms have been proven to be able to group the genes with similar ...
  • Geng, B; Li, Y; Tao, D; Wang, M; Zha, Z; Xu, C (IEEE, 2012-01)
    Existing video concept detectors are generally built upon the kernel based machine learning techniques, e.g., support vector machines, regularized least squares, and logistic regression, just to name a few. However, in ...
  • Ji, Z; Wang, G; Duan, R; Feng, Y; Ying, M (2006-10-10)
    The efficiency of parameter estimation of quantum channels is studied in this paper. We introduce the concept of programmable parameters to the theory of estimation. It is found that programmable parameters obey the standard ...
  • Zhang, S (IEEE Computer Society, 2008-01)
    Missing data imputation is an important step in the process of machine learning and data mining when certain values are missed. Among extant imputation techniques, kNN imputation algorithm is the best one as it is a model ...
  • Le, H; Hoang, DB; Simmonds, AJ (World Scientific Publishing, 2006-01)
    Peer-to-Peer (P2P) technologies developed rapidly in different directions with various applications and routing mechanisms. Each of them deals with a particular task, and/or provides a specific service. They were developed ...
  • Duan, R; Feng, Y; Ying, M (IEEE-Inst Electrical Electronics Engineers Inc, 2006-01)
    Suppose Alice and Bob try to transform an entangled state shared between them into another one by local operations and classical communications. Then in general a certain amount of entanglement contained in the initial ...
  • Johnston, AJ; Marks, B (M I T Press, 2007-01)
    NA
  • Dahlberg, T; Mallat, N; Ondrus, J; Bachfischer, A (Elsevier BV, 2008-01)
    The mobile payment services markets are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities with potential new technology innovations. ...
  • Zhang, T; Tao, D; Li, X; Yang, J (IEEE Computer Soc, 2009-01)
    Spectral analysis-based dimensionality reduction algorithms are important and have been popularly applied in data mining and computer vision applications. To date many algorithms have been developed, e. g., principal ...
  • Jay, Barry (ACM Press, 2004)
    There is a significant class of operations such as mapping that are common to all data structures. The goal of generic programming is to support these operations on arbitrary data types without having to recode for each ...
  • Feng, M; Dong, G; Li, J; Tan, Y-P; Wong, L (2010-08)
  • Stanton, CJ; Ratanasena, E; Haider, S; Williams, M (Springer, 2012-01)
    We present a method for enabling an Aldebaran Nao humanoid robot to perceive bumps and touches caused by physical contact forces. Dedicated touch, tactile or force sensors are not used. Instead, our approach involves the ...
  • Tang, Zhenjun; Dai, Yumin; Zhang, Xianquan; Zhang, Shichao (Springer, 2012)
    Image hashing is an emerging technology for the need of, such as image authentication, digital watermarking, image copy detection and image indexing in multimedia processing, which derives a content-based compact representation, ...
  • Paisitkriangkrai, S; Shen, C; Zhang, J (The Institution of Engineering and Technology, 2008-01)
    Detecting pedestrians accurately is the first fundamental step for many computer vision applications such as video surveillance, smart vehicles, intersection traffic analysis and so on. The authors present an experimental ...
  • Daruwalla, P; Darcy, SA (Pergamon-Elsevier Science Ltd, 2005-01)
    The research addresses theoretical and conceptual frameworks dealing with the formation and change of attitudes, cognitive dissonance, positive and negative prejudice, the concept of spread, overt and covert attitudes and ...
  • Bakkes, IS; Tan, C; Pisan, Y (Auckland University of Technology, 2012-01)
    This article focuses on personalised games, which we define as games that utilise player models for the purpose of tailoring the game experience to the individual player. The main contribution of the article is a motivation ...
  • Ying, M (IEEE-Inst Electrical Electronics Engineers Inc, 1999-01)
    We propose the concepts of maximum and average perturbations of fuzzy sets and estimate maximum and average perturbation parameters for various methods of fuzzy reasoning.