Sciweavers

2444 search results - page 397 / 489
» Feature Construction for Back-Propagation
Sort
View
TCSV
2008
297views more  TCSV 2008»
15 years 4 months ago
Activity Analysis, Summarization, and Visualization for Indoor Human Activity Monitoring
Abstract--In this work, we study how continuous video monitoring and intelligent video processing can be used in eldercare to assist the independent living of elders and to improve...
Zhongna Zhou, Xi Chen, Yu-Chia Chung, Zhihai He, T...
158
Voted
TKDE
2008
158views more  TKDE 2008»
15 years 4 months ago
Hierarchical Clustering of Time-Series Data Streams
This paper presents a time series whole clustering system that incrementally constructs a tree-like hierarchy of clusters, using a top-down strategy. The Online Divisive-Agglomera...
Pedro Pereira Rodrigues, João Gama, Jo&atil...
TSE
2008
99views more  TSE 2008»
15 years 4 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
125
Voted
AIEDU
2004
105views more  AIEDU 2004»
15 years 4 months ago
Evaluating the REDEEM Authoring Tool: Can Teachers Create Effective Learning Environments?
The REDEEM authoring environment allows teachers to create learning environments from existing computer-based training (CBT) by imposing their pedagogical preferences about how stu...
Shaaron Ainsworth, Shirley Grimshaw
JUCS
2007
96views more  JUCS 2007»
15 years 4 months ago
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Sanjit Chatterjee, Palash Sarkar