Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
information segmentation » formation segmentation, information augmentation, information segregation
data line » data lines, data link, data life
information segmentation » formation segmentation, information augmentation, information segregation
data line » data lines, data link, data life
1
Table of Contents:
“...Introduction: Data Science and BigData Computing -- Overview of Basic Methods for Data Science...”
View full text
View full text
Electronic
eBook
2
Published 2007
Table of Contents:
“... of Ridge Lines Methods -- Design and Prototyping of an Industrial Fault Clustering System Combining Image...”View full text
Electronic
eBook
3
Published 2010
Table of Contents:
“... and Web Information for Japanese Language -- A Chinese Sentence Compression Method for Opinion Mining...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... of Arbitrary Shapes and Densities in High Dimensional Data -- A Knowledge-Driven Bi-clustering Method...”View full text
Electronic
eBook
5
Published 2014
Table of Contents:
“... -- Collecting Valuable Information from Fast Text Streams -- An AUML State Machine Based Method for Multi-agent...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... of Granular Computing and k–NN Classifiers for Medical Data Support System -- Lip Print Recognition Method...”View full text
Electronic
eBook
7
Published 2005
Table of Contents:
“... Tracking Homotopy Iteration Method -- Fast Stereo Matching Method Using Edge Traction -- Hybrid Color Image...”View full text
Electronic
eBook
8
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Published 2005
Table of Contents:
“... -- Generation of 3D Building Model Using 3D Line Detection Scheme Based on Line Fitting of Elevation Data...”View full text
Electronic
eBook
9
Advances in Multimedia Information Processing - PCM 2005 6th Pacific Rim Conference on Multimedia...
Published 2005
Table of Contents:
“... Method for Data Hiding in Color Images -- A Color Image Encryption Algorithm Based on Magic Cube...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“...-blind Image Deconvolution with Adaptive Regularization -- Robust Lip Segmentation Method Based on Level...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Objects from Architectural to Line Drawings -- Extracting Road Vector Data from Raster Maps -- Human...”View full text
Electronic
eBook
12
Published 2014
Table of Contents:
“...-Based Hole-Filling Technique for Multiple Dynamic Objects -- Line Segment Detection with Hough Transform...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... on Dense Volumetric 3D Reconstructions from Multi Camera Setups -- On-Line Handwriting Recognition...”View full text
Electronic
eBook
14
Published 2006
Table of Contents:
“... Identification Method for Table Interpretation with Little Use of Previous Knowledge -- Session 6: Handwriting 2...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... Energy for Fingerprint Segmentation -- Similarity Search in Multimedia Time Series Data Using Amplitude...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“... Invariants -- The Application of the Snake Model in Carcinoma Cell Image Segment -- Special Session on Data...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... for Graphs through the Directed Line Graphs -- The Virtues of Peer Pressure: A Simple Method for Discovering...”View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... for Microarray Data -- New Method for Dynamic Signature Verification Using Hybrid Partitioning -- New Method...”View full text
Electronic
eBook
19
Published 2014
Table of Contents:
“... for IR: Capturing Term Contexts Using Random Indexing for Comprehensive Information Retrieval -- Data...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk...”View full text
Electronic
eBook



