Sciweavers

2300 search results - page 417 / 460
» Learning Dialogue POMDP Models from Data
Sort
View
ACL
2006
13 years 10 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 9 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
CVPR
2003
IEEE
14 years 11 months ago
Activity Recognition Using the Dynamics of the Configuration of Interacting Objects
Monitoring activities using video data is an important surveillance problem. A special scenario is to learn the pattern of normal activities and detect abnormal events from a very...
Namrata Vaswani, Amit K. Roy Chowdhury, Rama Chell...
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
12 years 4 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton