Sciweavers

3193 search results - page 591 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
CVPR
2010
IEEE
14 years 4 months ago
The Role of Features, Algorithms and Data in Visual Recognition
There are many computer vision algorithms developed for visual (scene and object) recognition. Some systems focus on involved learning algorithms, some leverage millions of trainin...
Devi Parikh and C. Lawrence Zitnick
KDD
2003
ACM
243views Data Mining» more  KDD 2003»
14 years 8 months ago
Accurate decision trees for mining high-speed data streams
In this paper we study the problem of constructing accurate decision tree models from data streams. Data streams are incremental tasks that require incremental, online, and any-ti...
João Gama, Pedro Medas, Ricardo Rocha
EUROSYS
2009
ACM
14 years 4 months ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
MM
2009
ACM
125views Multimedia» more  MM 2009»
14 years 2 months ago
Unfolding speaker clustering potential: a biomimetic approach
Speaker clustering is the task of grouping a set of speech utterances into speaker-specific classes. The basic techniques for solving this task are similar to those used for spea...
Thilo Stadelmann, Bernd Freisleben
ICWL
2005
Springer
14 years 1 months ago
Grounding Collaborative Knowledge Building in Semantics-Based Critiquing
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Anders I. Mørch, William K. Cheung, Kelvin ...