Sciweavers

1748 search results - page 223 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
KDD
2004
ACM
103views Data Mining» more  KDD 2004»
16 years 3 months ago
An objective evaluation criterion for clustering
We propose and test an objective criterion for evaluation of clustering performance: How well does a clustering algorithm run on unlabeled data aid a classification algorithm? The...
Arindam Banerjee, John Langford
IBPRIA
2007
Springer
15 years 9 months ago
Known Unknowns: Novelty Detection in Condition Monitoring
In time-series analysis it is often assumed that observed data can be modelled as being derived from a number of regimes of dynamics, as e.g. in a Switching Kalman Filter (SKF) [1,...
John A. Quinn, Christopher K. I. Williams
ETRA
2008
ACM
149views Biometrics» more  ETRA 2008»
15 years 5 months ago
The incomplete fixation measure
In this paper we evaluate several of the most popular algorithms for segmenting fixations from saccades by testing these algorithms on the scanning patterns of toddlers. We show t...
Frederick Shic, Brian Scassellati, Katarzyna Chawa...
AC
2003
Springer
15 years 7 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
INFOCOM
2007
IEEE
15 years 9 months ago
Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
—Existing methods of measuring lifetimes in P2P systems usually rely on the so-called Create-Based Method (CBM) [16], which divides a given observation window into two halves and...
Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov