Sciweavers

4815 search results - page 141 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
ICASSP
2010
IEEE
15 years 3 months ago
Towards multi-speaker unsupervised speech pattern discovery
In this paper, we explore the use of a Gaussian posteriorgram based representation for unsupervised discovery of speech patterns. Compared with our previous work, the new approach...
Yaodong Zhang, James R. Glass
119
Voted
RAID
2010
Springer
15 years 1 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
142
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach
—A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to ...
Bin Chang, Yi Cui, Yuan Xue
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 2 months ago
Feature Construction for Relational Sequence Learning
Abstract. We tackle the problem of multi-class relational sequence learning using relevant patterns discovered from a set of labelled sequences. To deal with this problem, firstly...
Nicola Di Mauro, Teresa Maria Altomare Basile, Ste...
CAISE
2009
Springer
15 years 10 months ago
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs...
Bela Mutschler, Manfred Reichert