Sciweavers

2131 search results - page 304 / 427
» Immunity for Closed Sets
Sort
View
IDA
2007
Springer
14 years 11 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder
SIAMSC
2008
139views more  SIAMSC 2008»
14 years 11 months ago
Probing the Pareto Frontier for Basis Pursuit Solutions
The basis pursuit problem seeks a minimum one-norm solution of an underdetermined least-squares problem. Basis pursuit denoise (BPDN) fits the least-squares problem only approximat...
Ewout van den Berg, Michael P. Friedlander
RTS
2006
132views more  RTS 2006»
14 years 11 months ago
A framework for modular analysis and exploration of heterogeneous embedded systems
Abstract The increasing complexity of heterogeneous systems-on-chip, SoC, and distributed embedded systems makes system optimization and exploration a challenging task. Ideally, a ...
Arne Hamann, Marek Jersak, Kai Richter, Rolf Ernst
TASLP
2008
101views more  TASLP 2008»
14 years 11 months ago
Speaker Identification Using Instantaneous Frequencies
This work presents an experimental evaluation of different features for use in speaker identification. The features are tested using speech data provided by the CHAINS corpus, in a...
Marco Grimaldi, Fred Cummins
TASLP
2008
149views more  TASLP 2008»
14 years 11 months ago
Using Articulatory Representations to Detect Segmental Errors in Nonnative Pronunciation
Abstract--Motivated by potential applications in second-language pedagogy, we present a novel approach to using articulatory information to improve automatic detection of typical p...
Joseph Tepperman, Shrikanth Narayanan