• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 51,974
Next 10 →

BY VARIOUS TECHNIQUES

by Init Ithoi, Init Ithoi, Arine-fadzlun Ahmad, Jw Mak, Veeranoot Nissapatorn, Yee-ling Lau, Rohela Mahmud , 2011
"... titis (AK) which is reported in 1-2 cases per million contact lens wearers annually (CDC, 2010), and is capable of causing skin lesions and granulomatous amebic encephalitis (GAE) in individuals with compromised or competent immune systems, who inhale infective cysts or develop indolent, granulomato ..."
Abstract - Add to MetaCart
titis (AK) which is reported in 1-2 cases per million contact lens wearers annually (CDC, 2010), and is capable of causing skin lesions and granulomatous amebic encephalitis (GAE) in individuals with compromised or competent immune systems, who inhale infective cysts or develop indolent, granulomatous skin lesions in soil-contaminated wounds (CDC, 2010). Unlike Acanthamoeba, only one species of Naegleria, Naegleria fowleri, is known to infect humans by causing an

Review of various Techniques in Clustering

by Megha Gupta, Vishal Shrivastava
"... This paper presents the review of various techniques which are used for clustering in data mining.Clustering is the process of dividing data into group of similar objects.Clustering involves various techniques so that the data can be partitioned into groups of same data like k-means algorithm, k-med ..."
Abstract - Add to MetaCart
This paper presents the review of various techniques which are used for clustering in data mining.Clustering is the process of dividing data into group of similar objects.Clustering involves various techniques so that the data can be partitioned into groups of same data like k-means algorithm, k

A Survey of Image Registration Techniques

by Lisa Gottesfeld Brown - ACM Computing Surveys , 1992
"... Registration is a fundamental task in image processing used to match two or more pictures taken, for example, at different times, from different sensors or from different viewpoints. Over the years, a broad range of techniques have been developed for the various types of data and problems. These ..."
Abstract - Cited by 979 (2 self) - Add to MetaCart
Registration is a fundamental task in image processing used to match two or more pictures taken, for example, at different times, from different sensors or from different viewpoints. Over the years, a broad range of techniques have been developed for the various types of data and problems

A Survey of Program Slicing Techniques

by F. Tip - JOURNAL OF PROGRAMMING LANGUAGES , 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract - Cited by 790 (10 self) - Add to MetaCart
in 1979. Since then, various slightly different notions of program slices have been proposed, as well as a number of methods to compute them. An important distinction is that between a static and a dynamic slice. The former notion is computed without making assumptions regarding a program's input

Various Techniques of Regression Testing

by Eep Kaur, Eep Kaur
"... Abstract: Regression Testing is one of the most important and expensive activities of Software Maintenance. It involves testing the modified program to reveal faults introduced during maintenance and keeping the software’s level of reliability, as cheaply as possible. Two techniques of regression te ..."
Abstract - Add to MetaCart
tool working in conjunction with a testing tool. The second technique comprises procedures for testing and regression testing activities.. In this paper we have presented the various types of regression testing techniques their classifications.

Improved Statistical Alignment Models

by Franz Josef Och, Hermann Ney - In Proceedings of the 38th Annual Meeting of the Association for Computational Linguistics , 2000
"... In this paper, we present and compare various single-word based alignment models for statistical machine translation. We discuss the five IBM alignment models, the Hidden-Markov alignment model, smoothing techniques and various modifications. ..."
Abstract - Cited by 607 (12 self) - Add to MetaCart
In this paper, we present and compare various single-word based alignment models for statistical machine translation. We discuss the five IBM alignment models, the Hidden-Markov alignment model, smoothing techniques and various modifications.

Data Mining: An Overview from Database Perspective

by Ming-syan Chen, Jiawei Hun, Philip S. Yu - IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 1996
"... Mining information and knowledge from large databases has been recognized by many researchers as a key research topic in database systems and machine learning, and by many industrial companies as an important area with an opportunity of major revenues. Researchers in many different fields have sh ..."
Abstract - Cited by 532 (26 self) - Add to MetaCart
shown great interest in data mining. Several emerging applications in information providing services, such as data warehousing and on-line services over the Internet, also call for various data mining techniques to better understand user behavior, to improve the service provided, and to increase

The Theory of Hybrid Automata

by Thomas A. Henzinger , 1996
"... A hybrid automaton is a formal model for a mixed discrete-continuous system. We classify hybrid automata acoording to what questions about their behavior can be answered algorithmically. The classification reveals structure on mixed discrete-continuous state spaces that was previously studied on pur ..."
Abstract - Cited by 685 (12 self) - Add to MetaCart
on purely discrete state spaces only. In particular, various classes of hybrid automata induce finitary trace equivalence (or similarity, or bisimilarity) relations on an uncountable state space, thus permitting the application of various model-checking techniques that were originally developed for finite

SPEA2: Improving the Strength Pareto Evolutionary Algorithm

by Eckart Zitzler, Marco Laumanns, Lothar Thiele , 2001
"... The Strength Pareto Evolutionary Algorithm (SPEA) (Zitzler and Thiele 1999) is a relatively recent technique for finding or approximating the Pareto-optimal set for multiobjective optimization problems. In different studies (Zitzler and Thiele 1999; Zitzler, Deb, and Thiele 2000) SPEA has shown very ..."
Abstract - Cited by 708 (19 self) - Add to MetaCart
The Strength Pareto Evolutionary Algorithm (SPEA) (Zitzler and Thiele 1999) is a relatively recent technique for finding or approximating the Pareto-optimal set for multiobjective optimization problems. In different studies (Zitzler and Thiele 1999; Zitzler, Deb, and Thiele 2000) SPEA has shown

Statistical pattern recognition: A review

by Anil K. Jain, Robert P. W. Duin, Jianchang Mao - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2000
"... The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network techniques ..."
Abstract - Cited by 1035 (30 self) - Add to MetaCart
The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network
Next 10 →
Results 1 - 10 of 51,974
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University