Sciweavers

415 search results - page 54 / 83
» Intruders pattern identification
Sort
View
BMEI
2008
IEEE
14 years 11 months ago
A New Type of Image-Based Key
Keys are character based tools for plant identification. They are based on the decomposition of the plant into very small, atomistic parts. These parts are described with the tech...
Bruce Kirchoff, David Remington, Lixin Fu, Fereido...
COLING
2008
14 years 11 months ago
Two-Phased Event Relation Acquisition: Coupling the Relation-Oriented and Argument-Oriented Approaches
Addressing the task of acquiring semantic relations between events from a large corpus, we first argue the complementarity between the pattern-based relation-oriented approach and...
Shuya Abe, Kentaro Inui, Yuji Matsumoto
EMNLP
2006
14 years 11 months ago
Capturing Out-of-Vocabulary Words in Arabic Text
The increasing flow of information between languages has led to a rise in the frequency of non-native or loan words, where terms of one language appear transliterated in another. ...
Abdusalam F. A. Nwesri, Seyed M. M. Tahaghoghi, Fa...
AAAI
1996
14 years 11 months ago
Monitoring Frog Communities: An Application of Machine Learning
Automatic recognition of animal vocalisations would be a valuable tool for a variety of biological research and environmental monitoring applications . We report the development o...
Andrew Taylor, Graeme Watson, Gordon Grigg, Hamish...
CORR
2010
Springer
103views Education» more  CORR 2010»
14 years 10 months ago
Robust Matrix Decomposition with Outliers
Suppose a given observation matrix can be decomposed as the sum of a low-rank matrix and a sparse matrix (outliers), and the goal is to recover these individual components from th...
Daniel Hsu, Sham M. Kakade, Tong Zhang