Sciweavers

295 search results - page 59 / 59
» A framework for quantitative security analysis of machine le...
Sort
View
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 5 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
IWDW
2007
Springer
13 years 11 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
VIP
2003
13 years 6 months ago
Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction
Using different algorithms to segment different images is a quite straightforward strategy for automated image segmentation. But the difficulty of the optimal algorithm selection ...
Yong Xia, David Dagan Feng, Rongchun Zhao
DATAMINE
2002
147views more  DATAMINE 2002»
13 years 4 months ago
Discretization: An Enabling Technique
Discrete values have important roles in data mining and knowledge discovery. They are about intervals of numbers which are more concise to represent and specify, easier to use and ...
Huan Liu, Farhad Hussain, Chew Lim Tan, Manoranjan...
TASLP
2002
143views more  TASLP 2002»
13 years 4 months ago
Creating conversational interfaces for children
Creating conversational interfaces for children is challenging in several respects. These include acoustic modeling for automatic speech recognition (ASR), language and dialog mode...
Shrikanth S. Narayanan, Alexandros Potamianos