Sciweavers

781 search results - page 101 / 157
» Analysis and improvement of business process models using sp...
Sort
View
TDSC
2011
13 years 3 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
ICASSP
2008
IEEE
14 years 3 months ago
Automatic lecture transcription by exploiting presentation slide information for language model adaptation
The paper addresses language model adaptation for automatic lecture transcription by fully exploiting presentation slide information used in the lecture. As the text in the presen...
Tatsuya Kawahara, Yusuke Nemoto, Yuya Akita
STTT
1998
130views more  STTT 1998»
13 years 8 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
TOG
2008
926views more  TOG 2008»
13 years 8 months ago
3D-modeling by ortho-image generation from image sequences
A semi-automatic approach is presented that enables the generation of a high-quality 3D model of a static object from an image sequence that was taken by a moving, uncalibrated co...
Thorsten Thormählen, Hans-Peter Seidel
PKDD
2009
Springer
184views Data Mining» more  PKDD 2009»
14 years 3 months ago
Learning Preferences with Hidden Common Cause Relations
Abstract. Gaussian processes have successfully been used to learn preferences among entities as they provide nonparametric Bayesian approaches for model selection and probabilistic...
Kristian Kersting, Zhao Xu