Sciweavers

635 search results - page 99 / 127
» Bridging the Gaps between Cameras
Sort
View
ICDM
2010
IEEE
119views Data Mining» more  ICDM 2010»
14 years 8 months ago
Visually Controllable Data Mining Methods
A large number of data mining methods are, as such, not applicable to fast, intuitive, and interactive use. Thus, there is a need for visually controllable data mining methods. Suc...
Kai Puolamäki, Panagiotis Papapetrou, Jefrey ...
101
Voted
ICEIS
2010
IEEE
14 years 8 months ago
Pattern Recognition as a Human Centered non-Euclidean Problem
Regularities in the world are human defined. Patterns in the observed phenomena are there because we define and recognize them as such. Automatic pattern recognition tries to bridg...
Robert P. W. Duin
95
Voted
ICICS
2010
Springer
14 years 8 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
IWPSE
2010
IEEE
14 years 8 months ago
An exercise in iterative domain-specific language design
We describe our experiences with the process of designing a domain-specific language (DSL) and corresponding model transformations. The simultaneous development of the language an...
Marcel van Amstel, Mark van den Brand, Luc Engelen
PDPTA
2010
14 years 8 months ago
Enhancing the Discovery of Web Services: A Keyword-oriented Multiontology Reconciliation
Abstract-- The success of Web Services as a tool to decouple and distribute different processes is beyond any doubt. On the one hand, their distributed nature makes them perfect to...
Carlos Bobed, Eduardo Mena