Sciweavers

1419 search results - page 240 / 284
» Analysis of Summarization Evaluation Experiments
Sort
View
IJDMMM
2008
124views more  IJDMMM 2008»
15 years 5 months ago
Completing missing views for multiple sources of web media
: Combining multiple data sources, each with its own features, to achieve optimal inference has received a lot of attention in recent years. In inference from multiple data sources...
Shankara B. Subramanya, Zheshen Wang, Baoxin Li, H...
CSL
2007
Springer
15 years 5 months ago
Speaker-adaptive learning of resonance targets in a hidden trajectory model of speech coarticulation
A novel speaker-adaptive learning algorithm is developed and evaluated for a hidden trajectory model of speech coarticulation and reduction. Central to this model is the process o...
Dong Yu, Li Deng, Alex Acero
156
Voted
JSAC
2006
172views more  JSAC 2006»
15 years 5 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
142
Voted
ML
2006
ACM
142views Machine Learning» more  ML 2006»
15 years 5 months ago
The max-min hill-climbing Bayesian network structure learning algorithm
We present a new algorithm for Bayesian network structure learning, called Max-Min Hill-Climbing (MMHC). The algorithm combines ideas from local learning, constraint-based, and sea...
Ioannis Tsamardinos, Laura E. Brown, Constantin F....
152
Voted
PAMI
2008
196views more  PAMI 2008»
15 years 5 months ago
Distance Learning for Similarity Estimation
In this paper, we present a general guideline to find a better distance measure for similarity estimation based on statistical analysis of distribution models and distance function...
Jie Yu, Jaume Amores, Nicu Sebe, Petia Radeva, Qi ...