Sciweavers

13895 search results - page 2666 / 2779
» Exploration
Sort
View
JUCS
2008
130views more  JUCS 2008»
13 years 8 months ago
Feature Selection for the Classification of Large Document Collections
: Feature selection methods are often applied in the context of document classification. They are particularly important for processing large data sets that may contain millions of...
Janez Brank, Dunja Mladenic, Marko Grobelnik, Nata...
JUCS
2008
166views more  JUCS 2008»
13 years 8 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
DSP
2007
13 years 8 months ago
Short-time phase spectrum in speech processing: A review and some experimental results
Incorporating information from the short-time phase spectrum into a feature set for automatic speech recognition (ASR) may possibly serve to improve recognition accuracy. Currentl...
Leigh D. Alsteris, Kuldip K. Paliwal
DSS
2007
226views more  DSS 2007»
13 years 8 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
KAIS
2008
221views more  KAIS 2008»
13 years 8 months ago
Forecasting skewed biased stochastic ozone days: analyses, solutions and beyond
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently, we have been approached by Texas Commission on En...
Kun Zhang, Wei Fan
« Prev « First page 2666 / 2779 Last » Next »