Sciweavers

1997 search results - page 63 / 400
» A Model for Data Leakage Detection
Sort
View
ICASSP
2009
IEEE
15 years 6 months ago
A semi-supervised learning approach to online audio background detection
We present a framework for audio background modeling of complex and unstructured audio environments. The determination of background audio is important for understanding and predi...
Selina Chu, Shrikanth S. Narayanan, C.-C. Jay Kuo
WSC
2008
15 years 2 months ago
A new method for bottleneck detection
This paper presents a new method to identify and rank the bottlenecks in a manufacturing system. The proposed method is based on performance related data that are easy to capture,...
Sankar Sengupta, Kanchan Das, Robert P. VanTil
PERVASIVE
2011
Springer
14 years 2 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
15 years 12 months ago
DogmatiX Tracks down Duplicates in XML
Duplicate detection is the problem of detecting different entries in a data source representing the same real-world entity. While research abounds in the realm of duplicate detect...
Melanie Weis, Felix Naumann
ADBIS
2004
Springer
105views Database» more  ADBIS 2004»
15 years 5 months ago
Event Database Processing
: The purpose of the current work is to explore and improve the analysis of event data stored in event repositories, enabling the application of specialized event algebra operators...
Joris Mihaeli, Opher Etzion