Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
3
views
14
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,487
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Engineering Applications of Neural Networks : 20th International Conference, EANN 2019, Xersonisos, Crete, Greece, May 24-26, 2019, Proceedings
Binarising SIFT-Descriptors to Reduce the Curse of Dimensionality in Histogram-Based Object Recognition
other
Author(s):
Martin Stommel
,
Otthein Herzog
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Distinctive Image Features from Scale-Invariant Keypoints
David G. Lowe
(2004)
0
comments
Cited
1412
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Object recognition from local scale-invariant features
D.G. Lowe
(1999)
0
comments
Cited
904
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the Surprising Behavior of Distance Metrics in High Dimensional Space
Charu C. Aggarwal
,
Alexander Hinneburg
,
Daniel Keim
(2001)
0
comments
Cited
160
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 320-327
DOI:
10.1007/978-3-642-10546-3_38
SO-VID:
4fa10397-0283-4d0e-b362-043d67419d5b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Fusion Coherence: Scalable Cache Coherence for Heterogeneous Kilo-Core System
pp. 3
NDT-Agile: An Agile, CMMI-Compatible Framework for Web Engineering
pp. 17
DevSecOps: A Multivocal Literature Review
pp. 20
Large-Scale Neural Solvers for Partial Differential Equations
pp. 6
Learning from Computer Games: A Research Review
pp. 25
Harnessing ISO/IEC 12207 to Examine the Extent of SPI Activity in an Organisation
pp. 34
“Omotenashi” Must Comprise Hospitality and Service
pp. 38
NCBP: Network Coding Based Protocol for Recovering Lost Packets in the Internet of Things
pp. 46
Script Based Migration Toolkit for Cloud Computing Architecture in Building Scalable Investment Platforms
pp. 32
An Image Encryption Scheme with Efficient Permutation and Diffusion Processes
pp. 94
A Model Based Approach for Complex Dynamic Decision-Making
pp. 44
Unsupervised Learning in Ambient Assisted Living for Pattern and Anomaly Detection: A Survey
pp. 65
Towards the Dynamic Provision of Virtualized Security Services
pp. 66
Reservoir Computing Approaches Applied to Energy Management in Industry
pp. 31
An Effective Disaster Evacuation Assist System Utilized by an Ad-Hoc Network
pp. 68
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control
pp. 82
The Relationship between Group Awareness and Participation in a Computer-Supported Collaborative Environment
pp. 110
Exploratory Data Analysis
pp. 84
Global Chaos Synchronization of Hyperchaotic Pang and Wang Systems by Active Nonlinear Control
pp. 89
A Digital Library Effort to Support the Building of Grammatical Resources for Italian Dialects
pp. 101
Sensitivity Analysis of Reliability Characteristics to the Shape of the Life and Repair Time Distributions
pp. 178
Dynamic Partitioning of Transportation Network Using Evolutionary Spectral Clustering
pp. 168
A Maturity Model for ISO/IEC 20000-1 Based on the TIPA for ITIL Process Capability Assessment Model
pp. 190
An Investigation of Using Time and Ambient Conditions to Sense the Unexpected Removal of RFID Tag
pp. 86
Remote Sensing Image Segmentation Using Mean Shift Method
pp. 245
Generation of Learning Situations According to the Learner’s Profile Within a Virtual Environment
pp. 206
Blending Process Assessment and Employees Competencies Assessment in Very Small Entities
pp. 265
Metrics and Rankings: Myths and Fallacies
pp. 168
Reliable Mobile Application Modeling Based on Open API
pp. 196
A Flexibility Reference Model to Achieve Leagility in Virtual Organizations
pp. 216
A Noise Robust VDD Composed PCA-LDA Model for Face Recognition
pp. 250
Orientation System Based on Speculative Computation and Trajectory Mining
pp. 236
Cattle Identification Based on Muzzle Images Using Gabor Features and SVM Classifier
pp. 323
Formal Use of Design Patterns and Refactoring
pp. 273
Inventory Management System with Erlang Distribution of Batch Sizes
pp. 253
Topic-Centric Candidate Priors for Expert Finding Models
pp. 255
Towards Analyzing Data Security Risks in Cloud Computing Environments
pp. 322
Enhancing User Privacy in IoT: Integration of GDPR and Blockchain
pp. 336
Self-similarity Traffic and AQM Mechanism Based on Non-integer Order \(PI^{\alpha }D^{\beta }\) Controller
pp. 357
ECoG Based Brain Computer Interface with Subset Selection
pp. 365
Securing the Access to Electronic Health Records on Mobile Phones
pp. 335
Design of an Agent-Based Learning Environment for High-Risk Doorstep Scam Victims
pp. 420
Towards a Successful Mobile Map Service: An Empirical Examination of Technology Acceptance Model
pp. 320
Binarising SIFT-Descriptors to Reduce the Curse of Dimensionality in Histogram-Based Object Recognition
pp. 361
Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost
pp. 457
A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals
pp. 441
Evaluating Machine Learning Algorithms for Detecting DDoS Attacks
pp. 481
NrityaGuru: A Dance Tutoring System for Bharatanatyam Using Kinect
pp. 662
Strategies to Carry and Forward Packets in VANET
pp. 720
Kernel Learning with Hilbert-Schmidt Independence Criterion
pp. 732
A Novel Vehicle Blockchain Model Based on Hyperledger Fabric for Vehicle Supply Chain Management
pp. 649
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
pp. 492
Simulation of Malicious Nodes Detection Based on Machine Learing for WSN
pp. 558
Dynamic Evaluation and Implementation of Flood Loss Based on GIS Grid Data
pp. 550
An Improved Particle Swarm Optimization Algorithm
Similar content
3,487
Efficient and robust bitstream processing in binarised neural networks
Authors:
Sercan Aygün
,
Ece Gunes
,
Christophe De Vleeschouwer
Research on the influence of coal city resource development on economic development in China: based on “Resource Curse” hypothesis
Authors:
Research on relationship between resource abundance and regional economy development in China: based on resource curse theory
Authors:
See all similar
Cited by
1
The Bitvector Machine: A Fast and Robust Machine Learning Algorithm for Non-linear Problems
Authors:
Stefan Edelkamp
,
Martin Stommel
See all cited by