Sciweavers

238 search results - page 24 / 48
» Operational Data Analysis: Improved Predictions Using Multi-...
Sort
View
CSL
2006
Springer
13 years 7 months ago
A study in machine learning from imbalanced data for sentence boundary detection in speech
Enriching speech recognition output with sentence boundaries improves its human readability and enables further processing by downstream language processing modules. We have const...
Yang Liu, Nitesh V. Chawla, Mary P. Harper, Elizab...
ETRA
2008
ACM
235views Biometrics» more  ETRA 2008»
13 years 9 months ago
Using semantic content as cues for better scanpath prediction
Under natural viewing conditions, human observers use shifts in gaze to allocate processing resources to subsets of the visual input. There are many computational models that try ...
Moran Cerf, E. Paxon Frady, Christof Koch
ISVC
2010
Springer
13 years 6 months ago
On Supervised Human Activity Analysis for Structured Environments
We consider the problem of developing an automated visual solution for detecting human activities within industrial environments. This has been performed using an overhead view. Th...
Banafshe Arbab-Zavar, Imed Bouchrika, John N. Cart...
AINA
2006
IEEE
14 years 1 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...