Sciweavers

1486 search results - page 177 / 298
» Firewall Rules Analysis
Sort
View
LREC
2008
174views Education» more  LREC 2008»
15 years 5 months ago
Evaluation of a Machine Translation System for Low Resource Languages: METIS-II
In this paper we describe the METIS-II system and its evaluation on each of the language pairs: Dutch, German, Greek, and Spanish to English. The METIS-II system envisaged develop...
Vincent Vandeghinste, Peter Dirix, Ineke Schuurman...
NIPS
2008
15 years 5 months ago
Domain Adaptation with Multiple Sources
This paper presents a theoretical analysis of the problem of domain adaptation with multiple sources. For each source domain, the distribution over the input points as well as a h...
Yishay Mansour, Mehryar Mohri, Afshin Rostamizadeh
TRECVID
2008
15 years 5 months ago
Florida International University and University of Miami TRECVID 2008 - High Level Feature Extraction
This paper describes the FIU-UM group TRECVID 2008 high level feature extraction task submission. We have used a correlation based video semantic concept detection system for this...
Guy Ravitz, Lin Lin, Mei-Ling Shyu, Michael Armell...
DMIN
2006
239views Data Mining» more  DMIN 2006»
15 years 5 months ago
Mining of Stock Data: Intra- and Inter-Stock Pattern Associative Classification
In this paper, a pattern-based stock data mining approach which transforms the numeric stock data to symbolic sequences, carries out sequential and non-sequential association analy...
Jo Ting, Tak-Chung Fu, Fu-Lai Chung
BDA
2003
15 years 5 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral