Sciweavers

2028 search results - page 258 / 406
» Deriving Relation Keys from XML Keys
Sort
View
153
Voted
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
EVENT
2001
202views more  EVENT 2001»
15 years 6 months ago
Detecting Independently Moving Objects and Their Interactions in Georeferenced Airborne Video
In airborne video, objects are tracked from a moving camera and often imaged at very low resolution. The camera movement makes it difficult to determine whether or not an object i...
J. Brian Burns
143
Voted
SLP
1994
89views more  SLP 1994»
15 years 6 months ago
Signed Logic Programs
In this paper we explore the notion of a \signing" of a logic program, in the framework of the answer set semantics. In particular, we generalize and extend the notion of a s...
Hudson Turner
IPL
2008
80views more  IPL 2008»
15 years 4 months ago
A simpler competitive analysis for scheduling equal-length jobs on one machine with restarts
We consider the online problem of scheduling jobs with equal processing times on a single machine. Each job has a release time and a deadline, and the goal is to maximize the numb...
Michael H. Goldwasser, Arundhati Bagchi Misra
JASIS
2006
68views more  JASIS 2006»
15 years 4 months ago
Query expansion behavior within a thesaurus-enhanced search environment: A user-centered evaluation
e to the CAB abstracts database. Data-gathering techniques included questionnaires, screen capturing software, and interviews. The results presented here relate to issues of search...
Ali Asghar Shiri, Crawford Revie