Sciweavers

694 search results - page 93 / 139
» Information Access in Multimedia Databases Based on Feature ...
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
GIS
2009
ACM
14 years 10 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
WEBDB
2000
Springer
110views Database» more  WEBDB 2000»
14 years 11 days ago
Modeling Data Entry and Operations in WebML
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...
Aldo Bongio, Stefano Ceri, Piero Fraternali, Andre...
SPEECH
2008
124views more  SPEECH 2008»
13 years 8 months ago
Statistical mapping between articulatory movements and acoustic spectrum using a Gaussian mixture model
In this paper, we describe a statistical approach to both an articulatory-to-acoustic mapping and an acoustic-to-articulatory inversion mapping without using phonetic information....
Tomoki Toda, Alan W. Black, Keiichi Tokuda
WWW
2008
ACM
13 years 8 months ago
KC3 browser: semantic mash-up and link-free browsing
This paper proposes a general framework of for a system with a semantic browsing and visualization interface called Knowledge Communication, Collaboration and Creation Browser (KC...
Michiaki Iwazume, Ken Kaneiwa, Koji Zettsu, Takafu...