Sciweavers

1957 search results - page 334 / 392
» Summarization - Compressing Data into an Informative Represe...
Sort
View
XMLSEC
2003
ACM
14 years 3 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
ECCV
2008
Springer
15 years 1 days ago
Latent Pose Estimator for Continuous Action Recognition
Recently, models based on conditional random fields (CRF) have produced promising results on labeling sequential data in several scientific fields. However, in the vision task of c...
Huazhong Ning, Wei Xu, Yihong Gong, Thomas S. Huan...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 10 months ago
Fast contextual preference scoring of database tuples
To provide users with only relevant data from the huge amount of available information, personalization systems utilize preferences to allow users to express their interest on spe...
Kostas Stefanidis, Evaggelia Pitoura
IJCNN
2008
IEEE
14 years 4 months ago
A comparison of fuzzy ARTMAP and Gaussian ARTMAP neural networks for incremental learning
Abstract— Automatic pattern classifiers that allow for incremental learning can adapt internal class models efficiently in response to new information, without having to retrai...
Eric Granger, Jean-François Connolly, Rober...