Sciweavers

2006 search results - page 94 / 402
» Heuristic Security-Testing Methods
Sort
View
ECAI
2004
Springer
15 years 4 months ago
Instance-Based Prediction with Guaranteed Confidence
Instance-based learning (IBL) algorithms have proved to be successful in many applications. However, as opposed to standard statistical methods, a prediction in IBL is usually give...
Eyke Hüllermeier
82
Voted
AAAI
2007
15 years 3 months ago
Computing Optimal Subsets
Various tasks in decision making and decision support require selecting a preferred subset of items from a given set of feasible items. Recent work in this area considered methods...
Maxim Binshtok, Ronen I. Brafman, Solomon Eyal Shi...
117
Voted
DATESO
2007
157views Database» more  DATESO 2007»
15 years 2 months ago
Index-Based Approach to Similarity Search in Protein and Nucleotide Databases
When searching databases of nucleotide or protein sequences, finding a local alignment of two sequences is one of the main tasks. Since the sizes of available databases grow const...
David Hoksza, Tomás Skopal
94
Voted
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
16 years 1 months ago
The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis
The analysis of user behavior on the Web presupposes a reliable reconstruction of the users' navigational activities. Cookies and server-generated session identifiers have be...
Bettina Berendt, Bamshad Mobasher, Miki Nakagawa, ...
112
Voted
ICASSP
2010
IEEE
14 years 7 months ago
Search error risk minimization in Viterbi beam search for speech recognition
This paper proposes a method to optimize Viterbi beam search based on search error risk minimization in large vocabulary continuous speech recognition (LVCSR). Most speech recogni...
Takaaki Hori, Shinji Watanabe, Atsushi Nakamura