Sciweavers

1517 search results - page 183 / 304
» On automatic knowledge validation for Bayesian knowledge bas...
Sort
View
INTERSPEECH
2010
13 years 4 months ago
Hierarchical multilayer perceptron based language identification
Automatic language identification (LID) systems generally exploit acoustic knowledge, possibly enriched by explicit language specific phonotactic or lexical constraints. This pape...
David Imseng, Mathew Magimai-Doss, Hervé Bo...
CAISE
2003
Springer
14 years 2 months ago
Towards the Automation of Data Warehouse Logical Design: a Rule-Based Approach
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
ISBI
2008
IEEE
14 years 3 months ago
Automated gland and nuclei segmentation for grading of prostate and breast cancer histopathology
Automated detection and segmentation of nuclear and glandular structures is critical for classification and grading of prostate and breast cancer histopathology. In this paper, w...
Shivang Naik, Scott Doyle, Shannon Agner, Anant Ma...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
14 years 6 months ago
Constraint-Based Subspace Clustering.
In high dimensional data, the general performance of traditional clustering algorithms decreases. This is partly because the similarity criterion used by these algorithms becomes ...
Élisa Fromont, Adriana Prado, Céline...
CODES
2007
IEEE
14 years 3 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...