Sciweavers

1486 search results - page 81 / 298
» Firewall Rules Analysis
Sort
View
ATAL
2007
Springer
15 years 6 months ago
On the robustness of preference aggregation in noisy environments
In an election held in a noisy environment, agents may unintentionally perturb the outcome by communicating faulty preferences. We investigate this setting by introducing a theore...
Ariel D. Procaccia, Jeffrey S. Rosenschein, Gal A....
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
15 years 5 months ago
Web mining from competitors' websites
This paper presents a framework for user-oriented text mining. It is then illustrated with an example of discovering knowledge from competitors’ websites. The knowledge to be di...
Xin Chen, Yi-fang Brook Wu
TSP
2008
174views more  TSP 2008»
14 years 11 months ago
Complex ICA Using Nonlinear Functions
We introduce a framework based on Wirtinger calculus for nonlinear complex-valued signal processing such that all computations can be directly carried out in the complex domain. Th...
Tülay Adali, Hualiang Li, Mike Novey, J.-F. C...
ICIP
2004
IEEE
16 years 1 months ago
Cell nuclei segmentation using fuzzy logic engine
The task of segmenting cell nuclei in microscope images is a classical image analysis problem. The accurate nuclei segmentation may contribute to development of successful system ...
Grigory Begelman, Eran Gur, Ehud Rivlin, Michael R...
AMR
2007
Springer
159views Multimedia» more  AMR 2007»
15 years 6 months ago
Automatically Detecting Members and Instrumentation of Music Bands Via Web Content Mining
Abstract. In this paper, we present an approach to automatically detecting music band members and instrumentation using web content mining techniques. To this end, we combine a nam...
Markus Schedl, Gerhard Widmer