Sciweavers

1311 search results - page 176 / 263
» Kernel-based relation extraction from investigative data
Sort
View
127
Voted
HCI
2007
15 years 5 months ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ICASSP
2009
IEEE
15 years 1 months ago
Target detection using incremental learning on single-trial evoked response
The human neural responses associated with cognitive events, referred as event related potentials (ERPs), can provide reliable inference for target image detection. Incremental le...
Yonghong Huang, Deniz Erdogmus, Misha Pavel, Kenne...
ICPPW
2002
IEEE
15 years 9 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
ISMIR
2005
Springer
143views Music» more  ISMIR 2005»
15 years 9 months ago
Fuzzy Analysis in Pitch-Class Determination for Polyphonic Audio Key Finding
This paper presents a fuzzy analysis technique for pitch class determination that improves the accuracy of key finding from audio information. Errors in audio key finding, typical...
Ching-Hua Chuan, Elaine Chew
BMCBI
2008
179views more  BMCBI 2008»
15 years 4 months ago
Bayesian modeling of recombination events in bacterial populations
Background: We consider the discovery of recombinant segments jointly with their origins within multilocus DNA sequences from bacteria representing heterogeneous populations of fa...
Pekka Marttinen, Adam Baldwin, William P. Hanage, ...