Sciweavers

463 search results - page 78 / 93
» Database De-Centralization - A Practical Approach
Sort
View
ISSA
2004
15 years 26 days ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
IJCAI
1997
15 years 25 days ago
Reifying Concepts in Description Logics
Practical applications of description logics (DLs) in knowledge-based systems have forced us to introduce the following features which are absent from existing DLs: • allowing a...
Liviu Badea
CSL
2010
Springer
14 years 11 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
77
Voted
CSL
2006
Springer
14 years 11 months ago
Using quality measures for multilevel speaker recognition
The use of quality information for multilevel speaker recognition systems is addressed in this contribution. From a definition of what constitutes a quality measure, two applicati...
Daniel Garcia-Romero, Julian Fiérrez-Aguila...
INFORMATICALT
2008
124views more  INFORMATICALT 2008»
14 years 11 months ago
Hierarchical Adaptive Clustering
This paper studies an adaptive clustering problem. We focus on re-clustering an object set, previously clustered, when the feature set characterizing the objects increases. We prop...
Gabriela Serban, Alina Campan