Sciweavers

2097 search results - page 393 / 420
» Knowledge Base Maintenance through Knowledge Representation
Sort
View
GLOBECOM
2010
IEEE
14 years 7 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
SPIESR
2003
230views Database» more  SPIESR 2003»
14 years 11 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...
BMCBI
2008
148views more  BMCBI 2008»
14 years 9 months ago
StAR: a simple tool for the statistical comparison of ROC curves
Background: As in many different areas of science and technology, most important problems in bioinformatics rely on the proper development and assessment of binary classifiers. A ...
Ismael A. Vergara, Tomás Norambuena, Evandr...
KDD
2008
ACM
239views Data Mining» more  KDD 2008»
15 years 10 months ago
Mining adaptively frequent closed unlabeled rooted trees in data streams
Closed patterns are powerful representatives of frequent patterns, since they eliminate redundant information. We propose a new approach for mining closed unlabeled rooted trees a...
Albert Bifet, Ricard Gavaldà
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin