Sciweavers

1036 search results - page 197 / 208
» Algorithms for Learning Regular Expressions
Sort
View
RAID
2010
Springer
13 years 5 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
EJC
2010
13 years 2 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
TKDE
2010
224views more  TKDE 2010»
13 years 2 months ago
Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering
Coclustering heterogeneous data has attracted extensive attention recently due to its high impact on various important applications, such us text mining, image retrieval, and bioin...
Yanhua Chen, Lijun Wang, Ming Dong
ICASSP
2011
IEEE
12 years 11 months ago
Nonstationary and temporally correlated source separation using Gaussian process
Blind source separation (BSS) is a process to reconstruct source signals from the mixed signals. The standard BSS methods assume a fixed set of stationary source signals with the ...
Hsin-Lung Hsieh, Jen-Tzung Chien
JAISE
2011
191views more  JAISE 2011»
12 years 10 months ago
Supporting peace of mind and independent living with the Aurama awareness system
An awareness system was designed to provide peace of mind and a sense of connectedness to adults who care for an elderly parent living alone. The iterative design of the Aurama awa...
Pavan Dadlani, Panos Markopoulos, Alexander Sinits...