Sciweavers

IPCO
2007
108views Optimization» more  IPCO 2007»
13 years 6 months ago
Robust Combinatorial Optimization with Exponential Scenarios
Following the well-studied two-stage optimization framework for stochastic optimization [15, 18], we study approximation algorithms for robust two-stage optimization problems with ...
Uriel Feige, Kamal Jain, Mohammad Mahdian, Vahab S...
EMNLP
2007
13 years 6 months ago
Single Malt or Blended? A Study in Multilingual Parser Optimization
We describe a two-stage optimization of the MaltParser system for the ten languages in the multilingual track of the CoNLL 2007 shared task on dependency parsing. The first stage...
Johan Hall, Jens Nilsson, Joakim Nivre, Gülse...
FGR
2000
IEEE
112views Biometrics» more  FGR 2000»
13 years 9 months ago
Viewpoint-Invariant Learning and Detection of Human Heads
We present a method to learn models of human heads for the purpose of detection from different viewing angles. We focus on a model where objects are represented as constellations ...
Markus Weber, Wolfgang Einhäuser, Max Welling...
GFKL
2004
Springer
135views Data Mining» more  GFKL 2004»
13 years 10 months ago
KMC/EDAM: A New Approach for the Visualization of K-Means Clustering Results
In this work we introduce a method for classification and visualization. In contrast to simultaneous methods like e.g. Kohonen SOM this new approach, called KMC/EDAM, runs through...
Nils Raabe, Karsten Luebke, Claus Weihs
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
13 years 10 months ago
PL-detective: a system for teaching programming language concepts
The educational literature recognizes that people go through a number of stages in their intellectual development. During the first stage, called received knowledge or dualism, p...
Amer Diwan, William M. Waite, Michele H. Jackson
IWIA
2006
IEEE
13 years 10 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
ICDM
2006
IEEE
122views Data Mining» more  ICDM 2006»
13 years 10 months ago
Latent Friend Mining from Blog Data
The rapid growth of blog (also known as “weblog”) data provides a rich resource for social community mining. In this paper, we put forward a novel research problem of mining t...
Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
CEC
2007
IEEE
13 years 11 months ago
An ant colony optimizer for melody creation with baroque harmony
— We propose an algorithm that is based on the Ant Colony Optimization (ACO) metaheuristic for producing harmonized melodies. The algorithm works in two stages. In the first sta...
Michael Geis, Martin Middendorf
AI
2008
Springer
13 years 11 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...
IPPS
2008
IEEE
13 years 11 months ago
Ordered index seed algorithm for intensive DNA sequence comparison
This paper presents a seed-based algorithm for intensive DNA sequence comparison. The novelty comes from the way seeds are used to efficiently generate small ungapped alignments ...
Dominique Lavenier