Sciweavers

813 search results - page 117 / 163
» Learning semantic models from event logs
Sort
View
ISI
2006
Springer
14 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
NETCOOP
2007
Springer
15 years 5 months ago
Load Shared Sequential Routing in MPLS Networks: System and User Optimal Solutions
Recently Gerald Ash has shown through case studies that event dependent routing is attractive in large scale multi-service MPLS networks. In this paper, we consider the application...
Gilles Brunet, Fariba Heidari, Lorne Mason
CVPR
2005
IEEE
16 years 1 months ago
A Unified Optimization Based Learning Method for Image Retrieval
In this paper, an optimization based learning method is proposed for image retrieval from graph model point of view. Firstly, image retrieval is formulated as a regularized optimi...
Hanghang Tong, Jingrui He, Mingjing Li, Wei-Ying M...
JMLR
2012
13 years 1 months ago
A Bayesian Analysis of the Radioactive Releases of Fukushima
The Fukushima Daiichi disaster 11 March, 2011 is considered the largest nuclear accident since the 1986 Chernobyl disaster and has been rated at level 7 on the International Nucle...
Ryota Tomioka, Morten Mørup
ICASSP
2009
IEEE
15 years 6 months ago
Visual saliency with side information
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
Wei Jiang, Lexing Xie, Shih-Fu Chang