Sciweavers

761 search results - page 119 / 153
» Metadata Principles and Practicalities
Sort
View
ISSA
2004
15 years 3 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
NIPS
2001
15 years 3 months ago
Constructing Distributed Representations Using Additive Clustering
If the promise of computational modeling is to be fully realized in higherlevel cognitive domains such as language processing, principled methods must be developed to construct th...
Wheeler Ruml
WSCG
2004
209views more  WSCG 2004»
15 years 3 months ago
Cinematic Camera Control in 3D Computer Games
Good camera control and planning techniques in 3D computer games can give players deeper feelings about atmosphere of games. However, most modern computer games use fixed point-of...
Ting-Chieh Lin, Zen-Chung Shih, Yu-Ting Tsai
COLING
1996
15 years 3 months ago
Learning Dependencies between Case Frame Slots
We address the problem of automatically acquiring case frame patterns (selectional patterns) from large corpus data. In particular, we l)ropose a method of learning dependencies b...
Hang Li, Naoki Abe
CACM
2010
104views more  CACM 2010»
15 years 2 months ago
Faster dimension reduction
Data represented geometrically in high-dimensional vector spaces can be found in many applications. Images and videos, are often represented by assigning a dimension for every pix...
Nir Ailon, Bernard Chazelle