Sciweavers

648 search results - page 127 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
CIKM
2009
Springer
14 years 2 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang
ISI
2006
Springer
13 years 7 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
TIP
2010
170views more  TIP 2010»
13 years 2 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
SG
2009
Springer
14 years 2 months ago
Towards the Big Picture: Enriching 3D Models with Information Visualisation and Vice Versa
Abstract. Most information visualisation methods are based on abstract visual representations without any concrete manifestation in the “real world”. However, a variety of abst...
Michael Sedlmair, Kerstin Ruhland, Fabian Hennecke...
NETWORKING
2004
13 years 9 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...