Sciweavers

415 search results - page 54 / 83
» Intruders pattern identification
Sort
View
BMEI
2008
IEEE
15 years 1 months ago
A New Type of Image-Based Key
Keys are character based tools for plant identification. They are based on the decomposition of the plant into very small, atomistic parts. These parts are described with the tech...
Bruce Kirchoff, David Remington, Lixin Fu, Fereido...
COLING
2008
15 years 1 months ago
Two-Phased Event Relation Acquisition: Coupling the Relation-Oriented and Argument-Oriented Approaches
Addressing the task of acquiring semantic relations between events from a large corpus, we first argue the complementarity between the pattern-based relation-oriented approach and...
Shuya Abe, Kentaro Inui, Yuji Matsumoto
EMNLP
2006
15 years 1 months ago
Capturing Out-of-Vocabulary Words in Arabic Text
The increasing flow of information between languages has led to a rise in the frequency of non-native or loan words, where terms of one language appear transliterated in another. ...
Abdusalam F. A. Nwesri, Seyed M. M. Tahaghoghi, Fa...
AAAI
1996
15 years 1 months ago
Monitoring Frog Communities: An Application of Machine Learning
Automatic recognition of animal vocalisations would be a valuable tool for a variety of biological research and environmental monitoring applications . We report the development o...
Andrew Taylor, Graeme Watson, Gordon Grigg, Hamish...
CORR
2010
Springer
103views Education» more  CORR 2010»
14 years 12 months ago
Robust Matrix Decomposition with Outliers
Suppose a given observation matrix can be decomposed as the sum of a low-rank matrix and a sparse matrix (outliers), and the goal is to recover these individual components from th...
Daniel Hsu, Sham M. Kakade, Tong Zhang