Sciweavers

2190 search results - page 384 / 438
» Large-scale extraction and use of knowledge from text
Sort
View
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
MLMI
2007
Springer
15 years 3 months ago
Automatic Decision Detection in Meeting Speech
Abstract. Decision making is an important aspect of meetings in organisational settings, and archives of meeting recordings constitute a valuable source of information about the de...
Pei-yun Hsueh, Johanna D. Moore
ICCV
2009
IEEE
16 years 2 months ago
Time Series Prediction by Chaotic Modeling of Nonlinear Dynamical Systems
We use concepts from chaos theory in order to model nonlinear dynamical systems that exhibit deterministic behavior. Observed time series from such a system can be embedded into...
Arslan Basharat, Mubarak Shah
EUROCAST
2005
Springer
133views Hardware» more  EUROCAST 2005»
15 years 3 months ago
An Iterative Method for Mining Frequent Temporal Patterns
The incorporation of temporal semantic into the traditional data mining techniques has caused the creation of a new area called Temporal Data Mining. This incorporation is especial...
Francisco Guil, Antonio B. Bailón, Alfonso ...
EHCI
2004
14 years 11 months ago
Finding Iteration Patterns in Dynamic Web Page Authoring
Most of the current WWW is made up of dynamic pages. The development of dynamic pages is a difficult and costly endeavour, out-of-reach for most users, experts, and content produce...
José A. Macías, Pablo Castells