Sciweavers

2932 search results - page 509 / 587
» Higher order mining
Sort
View
TKDE
2011
186views more  TKDE 2011»
13 years 3 months ago
Discovering Activities to Recognize and Track in a Smart Environment
—The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals expe...
Parisa Rashidi, Diane J. Cook, Lawrence B. Holder,...
VC
2010
168views more  VC 2010»
13 years 2 months ago
From sentence to emotion: a real-time three-dimensional graphics metaphor of emotions extracted from text
This paper presents a novel concept: a graphical representation of human emotion extracted from text sentences. The major contributions of this paper are the following. First, we p...
Stéphane Gobron, Junghyun Ahn, Georgios Pal...
AINA
2010
IEEE
12 years 11 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
SPIN
2012
Springer
11 years 10 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...