Sciweavers

2620 search results - page 145 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
UM
2009
Springer
14 years 2 months ago
Recognition of Users' Activities Using Constraint Satisfaction
Ideally designed software allow users to explore and pursue interleaving plans, making it challenging to automatically recognize user interactions. The recognition algorithms prese...
Swapna Reddy, Ya'akov Gal, Stuart M. Shieber
IDEAL
2007
Springer
14 years 2 months ago
A Tool for Web Usage Mining
This paper presents a tool for web usage mining. The aim is centered on providing a tool that facilitates the mining process rather than implement elaborated algorithms and techniq...
José M. Domenech, Javier Lorenzo
ACL
2003
13 years 9 months ago
Finding Non-local Dependencies: Beyond Pattern Matching
We describe an algorithm for recovering non-local dependencies in syntactic dependency structures. The patternmatching approach proposed by Johnson (2002) for a similar task for p...
Valentin Jijkoun
GECCO
2008
Springer
171views Optimization» more  GECCO 2008»
13 years 9 months ago
Particle swarm clustering ensemble
Extracting natural groups of the unlabeled data is known as clustering. To improve the stability and robustness of the clustering outputs, clustering ensembles have emerged recent...
Abbas Ahmadi, Fakhri Karray, Mohamed Kamel
GIS
2009
ACM
13 years 5 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...