Sciweavers

473 search results - page 84 / 95
» Numerical Aspects in the Data Model of Conceptual Informatio...
Sort
View
KDD
2008
ACM
211views Data Mining» more  KDD 2008»
14 years 8 months ago
ArnetMiner: extraction and mining of academic social networks
This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting ...
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zha...
FLAIRS
2003
13 years 9 months ago
Advantages of Brahms for Specifying and Implementing a Multiagent Human-Robotic Exploration System
We have developed a model-based, distributed architecture that integrates diverse components in a system designed for lunar and planetary surface operations: an astronaut’s spac...
William J. Clancey, Maarten Sierhuis, Charis Kaski...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 18 days ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
ICASSP
2011
IEEE
12 years 11 months ago
Using clustering comparison measures for speaker recognition
Recent results seem to cast some doubt over the assumption that improvements in fused recognition accuracy for speaker recognition systems based on different acoustic features are...
Jia Min Karen Kua, Julien Epps, Mohaddeseh Nosrati...
PODS
2010
ACM
228views Database» more  PODS 2010»
13 years 9 months ago
Capturing missing tuples and missing values
Databases in real life are often neither entirely closed-world nor entirely open-world. Indeed, databases in an enterprise are typically partially closed, in which a part of the d...
Wenfei Fan, Floris Geerts