Sciweavers

2338 search results - page 396 / 468
» Using UML to model relational database operations
Sort
View
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 8 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...
ICASSP
2011
IEEE
13 years 14 days ago
Constrained discriminative mapping transforms for unsupervised speaker adaptation
Discriminative mapping transforms (DMTs) is an approach to robustly adding discriminative training to unsupervised linear adaptation transforms. In unsupervised adaptation DMTs ar...
Langzhou Chen, Mark J. F. Gales, K. K. Chin
PERCOM
2003
ACM
14 years 8 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
HRI
2010
ACM
14 years 3 months ago
Toward understanding natural language directions
—Speaking using unconstrained natural language is an intuitive and flexible way for humans to interact with robots. Understanding this kind of linguistic input is challenging be...
Thomas Kollar, Stefanie Tellex, Deb Roy, Nicholas ...
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo