Sciweavers

364 search results - page 49 / 73
» Discovering Hidden Evidence
Sort
View
ICSOC
2010
Springer
13 years 7 months ago
Creating Context-Adaptive Business Processes
Abstract. As the dynamicity of today's business environments keeps increasing, there is a need to continuously adapt business processes in order to respond to the changes in t...
Gabriel Hermosillo, Lionel Seinturier, Laurence Du...
INFOCOM
2010
IEEE
13 years 7 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
BCB
2010
138views Bioinformatics» more  BCB 2010»
13 years 3 months ago
Comparative analysis of biclustering algorithms
Biclustering is a very popular method to identify hidden co-regulation patterns among genes. There are numerous biclustering algorithms designed to undertake this challenging task...
Doruk Bozdag, Ashwin S. Kumar, Ümit V. &Ccedi...
TIST
2011
136views more  TIST 2011»
13 years 3 months ago
Probabilistic models for concurrent chatting activity recognition
Recognition of chatting activities in social interactions is useful for constructing human social networks. However, the existence of multiple people involved in multiple dialogue...
Jane Yung-jen Hsu, Chia-chun Lian, Wan-rong Jih
ICASSP
2011
IEEE
13 years 10 days ago
Deep Belief Networks using discriminative features for phone recognition
Deep Belief Networks (DBNs) are multi-layer generative models. They can be trained to model windows of coefficients extracted from speech and they discover multiple layers of fea...
Abdel-rahman Mohamed, Tara N. Sainath, George Dahl...