Sciweavers

1929 search results - page 276 / 386
» An Approach to Limit the Wynot Problem
Sort
View
ICASSP
2009
IEEE
14 years 3 months ago
Maximizing global entropy reduction for active learning in speech recognition
We propose a new active learning algorithm to address the problem of selecting a limited subset of utterances for transcribing from a large amount of unlabeled utterances so that ...
Balakrishnan Varadarajan, Dong Yu, Li Deng, Alex A...
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 3 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
14 years 3 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
CCS
2007
ACM
14 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
AVSS
2006
IEEE
14 years 3 months ago
Activity Topology Estimation for Large Networks of Cameras
Estimating the paths that moving objects can take through the fields of view of possibly non-overlapping cameras, also known as their activity topology, is an important step in t...
Anton van den Hengel, Anthony R. Dick, Rhys Hill