Sciweavers

303 search results - page 20 / 61
» On the Entropy Rate of Pattern Processes
Sort
View
IH
2004
Springer
14 years 1 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
CHI
2009
ACM
14 years 1 months ago
Correlating low-level image statistics with users - rapid aesthetic and affective judgments of web pages
In this paper, we report a study that examines the relationship between image-based computational analyses of web pages and users’ aesthetic judgments about the same image mater...
Xianjun Sam Zheng, Ishani Chakraborty, James Jeng-...
ICASSP
2011
IEEE
13 years 5 days ago
On the use of ideal binary masks for improving phonetic classification
Ideal binary masks are binary patterns that encode the masking characteristics of speech in noise. Recent evidence in speech perception suggests that such binary patterns provide ...
Arun Narayanan, DeLiang Wang
EDBT
2004
ACM
110views Database» more  EDBT 2004»
14 years 8 months ago
Using Convolution to Mine Obscure Periodic Patterns in One Pass
The mining of periodic patterns in time series databases is an interesting data mining problem that can be envisioned as a tool for forecasting and predicting the future behavior o...
Mohamed G. Elfeky, Walid G. Aref, Ahmed K. Elmagar...
ACL
1998
13 years 9 months ago
PAT-Trees with the Deletion Function as the Learning Device for Linguistic Patterns
In this study, a learning device based on the PATtree data structures was developed. The original PAT-trees were enhanced with the deletion function to emulate human learning comp...
Keh-Jiann Chen, Wen Tsuei, Lee-Feng Chien