Sciweavers

261 search results - page 37 / 53
» One Microphone Source Separation
Sort
View
ICSE
2009
IEEE-ACM
14 years 2 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ICICS
2005
Springer
14 years 1 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
SWWS
2008
13 years 9 months ago
A User Guided Iterative Alignment Approach for Ontology Mapping
- The future of the Semantic Web envisions an interconnected network of data and systems where software agents can communicate seamlessly to perform complicated tasks with limited ...
Danny Chen, John Lastusky, James Starz, Stephen Ho...
CSDA
2008
115views more  CSDA 2008»
13 years 7 months ago
Complex-valued ICA based on a pair of generalized covariance matrices
It is shown that any pair of scatter and spatial scatter matrices yields an estimator of the separating matrix for complex-valued independent component analysis (ICA). Scatter (re...
Esa Ollila, Hannu Oja, Visa Koivunen
SIGMOD
2011
ACM
199views Database» more  SIGMOD 2011»
12 years 10 months ago
Schema-as-you-go: on probabilistic tagging and querying of wide tables
The emergence of Web 2.0 has resulted in a huge amount of heterogeneous data that are contributed by a large number of users, engendering new challenges for data management and qu...
Meiyu Lu, Divyakant Agrawal, Bing Tian Dai, Anthon...