Sciweavers

2554 search results - page 118 / 511
» Keyword query cleaning
Sort
View
ICDM
2005
IEEE
271views Data Mining» more  ICDM 2005»
14 years 3 months ago
HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence
In this work, we introduce the new problem of finding time series discords. Time series discords are subsequences of a longer time series that are maximally different to all the r...
Eamonn J. Keogh, Jessica Lin, Ada Wai-Chee Fu
WOSP
2005
ACM
14 years 3 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
14 years 3 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
JCDL
2010
ACM
155views Education» more  JCDL 2010»
14 years 3 months ago
Scholarly paper recommendation via user's recent research interests
We examine the effect of modeling a researcher’s past works in recommending scholarly papers to the researcher. Our hypothesis is that an author’s published works constitute a...
Kazunari Sugiyama, Min-Yen Kan
COOPIS
2002
IEEE
14 years 3 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov