Sciweavers

8381 search results - page 1661 / 1677
» The security of machine learning
Sort
View
AIM
2005
13 years 7 months ago
Semantic Integration in Text: From Ambiguous Names to Identifiable Entities
Intelligent access to information requires semantic integration of structured databases with unstructured textual resources. While the semantic integration problem has been widely...
Xin Li, Paul Morie, Dan Roth
TASLP
2008
140views more  TASLP 2008»
13 years 7 months ago
Acoustic Chord Transcription and Key Extraction From Audio Using Key-Dependent HMMs Trained on Synthesized Audio
We describe an acoustic chord transcription system that uses symbolic data to train hidden Markov models and gives best-of-class frame-level recognition results. We avoid the extre...
Kyogu Lee, Malcolm Slaney
AO
2005
147views more  AO 2005»
13 years 7 months ago
Domain modelling and NLP: Formal ontologies? Lexica? Or a bit of both?
There are a number of genuinely open questions concerning the use of domain models in nlp. It would be great if contributors to Applied Ontology could help addressing them rather ...
Massimo Poesio
TASLP
2008
131views more  TASLP 2008»
13 years 7 months ago
A Noise-Robust FFT-Based Auditory Spectrum With Application in Audio Classification
In this paper, we investigate the noise robustness of Wang and Shamma's early auditory (EA) model for the calculation of an auditory spectrum in audio classification applicati...
Wei Chu, B. Champagne
TIFS
2008
154views more  TIFS 2008»
13 years 7 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
« Prev « First page 1661 / 1677 Last » Next »