Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2021
Analyzing Tourist's Movement in Sarbagita Metropolitan Area based on Geotagged Photo in Flickr
CCIOT '21: Proceedings of the 2021 6th International Conference on Cloud Computing and Internet of ThingsPages 60–67https://doi.org/10.1145/3493287.3493296The tourism sector is one of the biggest contributors to Indonesia's national income. Bali as one of the provinces that get most of its income from tourism and is also a favorite tourist destination plays an important role in Indonesia's tourism. This ...
- research-articleMay 2018
RP-DBSCAN: A Superfast Parallel DBSCAN Algorithm Based on Random Partitioning
SIGMOD '18: Proceedings of the 2018 International Conference on Management of DataPages 1173–1187https://doi.org/10.1145/3183713.3196887In most parallel DBSCAN algorithms, neighboring points are assigned to the same data partition for parallel processing to facilitate calculation of the density of the neighbors. This data partitioning scheme causes a few critical problems including load ...
- research-articleApril 2018
A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream
- Sylvio Barbon Junior,
- Gabriel Marques Tavares,
- Victor G. Turrisi da Costa,
- Paolo Ceravolo,
- Ernesto Damiani
WWW '18: Companion Proceedings of the The Web Conference 2018Pages 319–326https://doi.org/10.1145/3184558.3186343One of the main challenges of Cognitive Computing (CC) is reacting to evolving environments in near-real time. Therefore, it is expected that CC models provide solutions by examining a summary of past history, rather than using full historical data. This ...
- research-articleNovember 2017
HyPerInsight: Data Exploration Deep Inside HyPer
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge ManagementPages 2467–2470https://doi.org/10.1145/3132847.3133167Nowadays we are drowning in data of various varieties. For all these mixed types and categories of data there exist even more different analysis approaches, often done in single hand-written solutions. We propose to extend HyPer, a main memory database ...
- short-paperAugust 2017
Baseline Detection on Arabic Handwritten Documents
DocEng '17: Proceedings of the 2017 ACM Symposium on Document EngineeringPages 193–196https://doi.org/10.1145/3103010.3121037Document processing comprises different steps depending on the nature of the documents. For text documents, specially for handwritten documents, transcription of their contents is one of the main tasks. Handwritten Text Recognition (HTR) is the process ...
- posterJune 2016
Inventor Name Disambiguation for a Patent Database Using a Random Forest and DBSCAN
JCDL '16: Proceedings of the 16th ACM/IEEE-CS on Joint Conference on Digital LibrariesPages 269–270https://doi.org/10.1145/2910896.2925465Inventor name disambiguation is the task that distinguishes each unique inventor from all other inventor records in a patent database. This task is essential for processing person name queries in order to get information related to a specific inventor, ...
- research-articleMay 2015
DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation
SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of DataPages 519–530https://doi.org/10.1145/2723372.2737792DBSCAN is a popular method for clustering multi-dimensional objects. Just as notable as the method's vast success is the research community's quest for its efficient computation. The original KDD'96 paper claimed an algorithm with O(n log n) running ...
- research-articleOctober 2013
A non-parametric unsupervised approach for content based image retrieval and clustering
ARTEMIS '13: Proceedings of the 4th ACM/IEEE international workshop on Analysis and retrieval of tracked events and motion in imagery streamPages 33–40https://doi.org/10.1145/2510650.2510656Nowadays, there are available extremely large collections of images located on distributed and heterogeneous platforms over the web. The proliferation of billions of shared photos has outpaced the current technology for browsing such collections, but at ...
- ArticleOctober 2012
A Study on Clustering-Based Method for Detecting Network Intrusions with New Types
ICECC '12: Proceedings of the 2012 International Conference on Electronics, Communications and ControlPages 1168–1171Due to the endless emerging of new types of network intrusion, more and more attention are paid to how can the intrusion detection system solve these new types of invasion. This study used clustering techniques to distinguish abnormal data. A clustering ...
- research-articleOctober 2012
A feasibility study on using clustering algorithms in programming education research
SIGITE '12: Proceedings of the 13th annual conference on Information technology educationPages 145–150https://doi.org/10.1145/2380552.2380596Designing an experiment for programming education research, in which collecting and interpreting a large number of qualitative data about programmers is required, needs careful consideration in order to validate the experiment. When it comes to finding ...