Sciweavers

20833 search results - page 200 / 4167
» Hidden process models
Sort
View
ICMCS
2006
IEEE
344views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Pattern Mining in Visual Concept Streams
Pattern mining algorithms are often much easier applied than quantitatively assessed. In this paper we address the pattern evaluation problem by looking at both the capability of ...
Lexing Xie, Shih-Fu Chang
EDOC
2005
IEEE
15 years 9 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
TNN
2010
234views Management» more  TNN 2010»
14 years 10 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes
FOCI
2007
IEEE
15 years 9 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe
157
Voted
ICPR
2008
IEEE
15 years 9 months ago
Radical based fine trajectory HMMs of online handwritten characters
We study models that characterize pen trajectories of online handwritten characters in a fine manner. We propose radical based fine trajectory hidden Markov models (HMMs), which...
Peng Liu, Lei Ma, Frank K. Soong