Sciweavers

463 search results - page 78 / 93
» Database De-Centralization - A Practical Approach
Sort
View
ISSA
2004
13 years 8 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
IJCAI
1997
13 years 8 months ago
Reifying Concepts in Description Logics
Practical applications of description logics (DLs) in knowledge-based systems have forced us to introduce the following features which are absent from existing DLs: • allowing a...
Liviu Badea
CSL
2010
Springer
13 years 7 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
CSL
2006
Springer
13 years 7 months ago
Using quality measures for multilevel speaker recognition
The use of quality information for multilevel speaker recognition systems is addressed in this contribution. From a definition of what constitutes a quality measure, two applicati...
Daniel Garcia-Romero, Julian Fiérrez-Aguila...
INFORMATICALT
2008
124views more  INFORMATICALT 2008»
13 years 7 months ago
Hierarchical Adaptive Clustering
This paper studies an adaptive clustering problem. We focus on re-clustering an object set, previously clustered, when the feature set characterizing the objects increases. We prop...
Gabriela Serban, Alina Campan