Sciweavers

415 search results - page 22 / 83
» Intruders pattern identification
Sort
View
FSKD
2005
Springer
267views Fuzzy Logic» more  FSKD 2005»
15 years 3 months ago
Preventing Meaningless Stock Time Series Pattern Discovery by Changing Perceptually Important Point Detection
Discovery of interesting or frequently appearing time series patterns is one of the important tasks in various time series data mining applications. However, recent research critic...
Tak-Chung Fu, Fu-Lai Chung, Robert W. P. Luk, Chak...
IEEEARES
2010
IEEE
15 years 2 months ago
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats
Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically proce...
Michael Netter, Eduardo B. Fernández, G&uum...
ICPR
2008
IEEE
15 years 11 months ago
Extraction of shoe-print patterns from impression evidence using Conditional Random Fields
Impression evidence in the form of shoe-prints are commonly found in crime scenes. A critical step in automatic shoe-print identification is extraction of the shoe-print pattern. ...
Sargur N. Srihari, Veshnu Ramakrishnan
CAISE
2005
Springer
15 years 3 months ago
Patterns and metamodel for a natural-language-based requirements specification language
Abstract. Software requirements engineering is an essential activity for the successful development of information systems. Requirements can be specified using different techniques...
Carlos Videira, Alberto Rodrigues da Silva
PRL
1998
93views more  PRL 1998»
14 years 9 months ago
A connectionist method for pattern classification with diverse features
A novel connectionist method is proposed to simultaneously use diverse features in an optimal way for pattern classification. Unlike methods of combining multiple classifiers, a m...
Ke Chen 0001