Sciweavers

1154 search results - page 103 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 9 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
LCN
2006
IEEE
14 years 3 months ago
Optimal Multi-hop Cellular Architecture for Wireless Communications
Multi-hop relaying is an important concept in future generation wireless networks. It can address the inherent problems of limited capacity and coverage in cellular networks. Howe...
Yik Hung Tam, Hossam S. Hassanein, Selim G. Akl, R...
MR
2007
92views Robotics» more  MR 2007»
13 years 8 months ago
Feature extraction and damage-precursors for prognostication of lead-free electronics
Damage pre-cursors based health management and prognostication methodology has been presented for electronic systems in harsh environments. The framework has been developed based ...
Pradeep Lall, Madhura Hande, Chandan Bhat, Nokibul...
ICASSP
2011
IEEE
13 years 24 days ago
Rapid feature space MLLR speaker adaptation with bilinear models
In this paper, we propose a novel method for rapid feature space Maximum Likelihood Linear Regression (FMLLR) speaker adaptation based on bilinear models. When the amount of adapt...
Shilei Zhang, Peder A. Olsen, Yong Qin
WWW
2007
ACM
14 years 9 months ago
Bridging the gap between OWL and relational databases
Schema statements in OWL are interpreted quite differently from analogous statements in relational databases. If these statements are meant to be interpreted as integrity constrai...
Boris Motik, Ian Horrocks, Ulrike Sattler