Sciweavers

11129 search results - page 156 / 2226
» Modeling Search Computing Applications
Sort
View
112
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Voice search of structured media data
This paper addresses the problem of using unstructured queries to search a structured database in voice search applications. By incorporating structural information in music metad...
Young-In Song, Ye-Yi Wang, Yun-Cheng Ju, Mike Selt...
133
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 3 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
158
Voted
FGR
2011
IEEE
288views Biometrics» more  FGR 2011»
14 years 6 months ago
Hierarchical CRF with product label spaces for parts-based models
— Non-rigid object detection is a challenging open research problem in computer vision. It is a critical part in many applications such as image search, surveillance, humancomput...
Gemma Roig, Xavier Boix Bosch, Fernando De la Torr...
120
Voted
GRC
2007
IEEE
15 years 6 months ago
Perspectives of Granular Computing in Software Engineering
Granular computing is not only a computing model for computer-centered problem solving, but also a thinking model for human-centered problem solving. Some authors have presented t...
Jianchao Han, Jing Dong
102
Voted
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 8 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel