Sciweavers

554 search results - page 95 / 111
» Mining Duplicate Tasks from Discovered Processes
Sort
View
EDM
2009
175views Data Mining» more  EDM 2009»
13 years 5 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa
ACL
2012
11 years 10 months ago
Building Trainable Taggers in a Web-based, UIMA-Supported NLP Workbench
Argo is a web-based NLP and text mining workbench with a convenient graphical user interface for designing and executing processing workflows of various complexity. The workbench...
Rafal Rak, BalaKrishna Kolluru, Sophia Ananiadou
AIIA
2005
Springer
14 years 1 months ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta
AVSS
2006
IEEE
14 years 1 months ago
Learning Foveal Sensing Strategies in Unconstrained Surveillance Environments
In this paper we report on techniques for automatically learning foveal sensing strategies for an active pan-tiltzoom camera. The approach uses reinforcement learning to discover ...
Andrew D. Bagdanov, Alberto Del Bimbo, Walter Nunz...
ACSAC
2007
IEEE
14 years 1 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...