Sciweavers

1898 search results - page 279 / 380
» Weak Keys for IDEA
Sort
View
LREC
2008
150views Education» more  LREC 2008»
13 years 11 months ago
The 2008 Oriental COCOSDA Book Project: in Commemoration of the First Decade of Sustained Activities in Asia
The purpose of Oriental COCOSDA is to provide the Asian community a platform to exchange ideas, to share information and to discuss regional matters on creation, utilization, diss...
Shuichi Itahashi, Chiu-yu Tseng
LWA
2008
13 years 11 months ago
An Exploratory Study of User Goals and Strategies in Podcast Search
We report on an exploratory, qualitative user study designed to identify users' goals underlying podcast search, the strategies used to gain access to podcasts, and how curre...
Jana Besser, Katja Hofmann, Martha Larson
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 11 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
MVA
2007
196views Computer Vision» more  MVA 2007»
13 years 11 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
SDM
2007
SIAM
147views Data Mining» more  SDM 2007»
13 years 11 months ago
Constraint-Based Pattern Set Mining
Local pattern mining algorithms generate sets of patterns, which are typically not directly useful and have to be further processed before actual application or interpretation. Ra...
Luc De Raedt, Albrecht Zimmermann