Sciweavers

439 search results - page 53 / 88
» An Evaluation Framework for Plagiarism Detection
Sort
View
ICRA
2007
IEEE
199views Robotics» more  ICRA 2007»
15 years 7 months ago
Automatic Outlier Detection: A Bayesian Approach
— In order to achieve reliable autonomous control in advanced robotic systems like entertainment robots, assistive robots, humanoid robots and autonomous vehicles, sensory data n...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
CIKM
2008
Springer
15 years 3 months ago
Achieving both high precision and high recall in near-duplicate detection
To find near-duplicate documents, fingerprint-based paradigms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches a...
Lian'en Huang, Lei Wang, Xiaoming Li
IUI
1997
ACM
15 years 5 months ago
The Pedagogical Design Studio: Exploiting Artifact-Based Task Models for Constructivist Learning
Intelligentlearning environments that support constructivism shouldprovideactivelearningexperiencesthatarecustomized for individuallearners. To do so, they must determine learner ...
James C. Lester, Patrick J. Fitzgerald, Brian A. S...
TCSV
2008
153views more  TCSV 2008»
15 years 1 months ago
Broadcast Court-Net Sports Video Analysis Using Fast 3-D Camera Modeling
This paper addresses the automatic analysis of court-net sports video content. We extract information about the players, the playing-field in a bottom-up way until we reach scene-l...
Jungong Han, Dirk Farin, Peter H. N. de With
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 1 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...