Sciweavers

2582 search results - page 436 / 517
» Developing a Data Driven System for Computational Neuroscien...
Sort
View
VLDB
1999
ACM
188views Database» more  VLDB 1999»
15 years 5 months ago
SPIRIT: Sequential Pattern Mining with Regular Expression Constraints
Discovering sequential patterns is an important problem in data mining with a host of application domains including medicine, telecommunications, and the World Wide Web. Conventio...
Minos N. Garofalakis, Rajeev Rastogi, Kyuseok Shim
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
15 years 3 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
NIPS
2007
15 years 2 months ago
Modeling Natural Sounds with Modulation Cascade Processes
Natural sounds are structured on many time-scales. A typical segment of speech, for example, contains features that span four orders of magnitude: Sentences (∼1 s); phonemes (âˆ...
Richard Turner, Maneesh Sahani
ICML
2010
IEEE
15 years 2 months ago
Improved Local Coordinate Coding using Local Tangents
Local Coordinate Coding (LCC), introduced in (Yu et al., 2009), is a high dimensional nonlinear learning method that explicitly takes advantage of the geometric structure of the d...
Kai Yu, Tong Zhang
COMCOM
2008
91views more  COMCOM 2008»
15 years 1 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia