8 papers:
- SCSM-2015-KastratiIYD #analysis #network #online #social #using
- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
- HT-2011-KawasePHN
- Beyond the usual suspects: context-aware revisitation support (RK, GP, EH, WN), pp. 27–36.
- RecSys-2011-TayebiJEGF #named #recommendation
- CrimeWalker: a recommendation model for suspect investigation (MAT, MJ, ME, UG, RF), pp. 173–180.
- SAC-2008-SchiabelSA #detection #image #segmentation
- Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
- DAC-2005-MonyBPK #proving
- Exploiting suspected redundancy without proving it (HM, JB, VP, RK), pp. 463–466.
- SIGMOD-2004-LernerSWZZ #algorithm #biology #music #performance #physics
- Fast Algorithms for Time Series with applications to Finance, Physics, Music, Biology, and other Suspects (AL, DS, ZW, XZ, YZ), pp. 965–968.
- CIKM-1994-LeeW #identification #image #retrieval
- Computer Image Retrieval by Features: Selecting the Best Facial Features for Suspect Identification Systems (ESL, TW), pp. 105–111.
- INTERCHI-1993-LeeW #identification #image #retrieval
- Computer image retrieval by features: suspect identification (ESL, TW), pp. 494–499.