Sciweavers

16513 search results - page 2961 / 3303
» Numerical Analysis Methods
Sort
View
CIKM
2008
Springer
15 years 6 months ago
Mapping enterprise entities to text segments
Today, valuable business information is increasingly stored as unstructured data (documents, emails, etc.). For example, documents exchanged between business partners capture info...
Falk Brauer, Alexander Löser, Hong-Hai Do
173
Voted
ADMA
2005
Springer
202views Data Mining» more  ADMA 2005»
15 years 6 months ago
A Latent Usage Approach for Clustering Web Transaction and Building User Profile
Web transaction data between web visitors and web functionalities usually convey users’ task-oriented behavior patterns. Clustering web transactions, thus, may capture such infor...
Yanchun Zhang, Guandong Xu, Xiaofang Zhou
AICCSA
2005
IEEE
129views Hardware» more  AICCSA 2005»
15 years 6 months ago
Enhanced visual evaluation of feature extractors for image mining
Plus BROWSE SEARCH IEEE XPLORE GUIDE SUPPORT View TOC Enhanced visual evaluation of feature extractors for image mining Rodrigues, J.F., Jr. Traina, A.J.M. Traina, C., Jr. Comput. ...
José Fernando Rodrigues Jr., Agma J. M. Tra...
APCCAS
2006
IEEE
252views Hardware» more  APCCAS 2006»
15 years 6 months ago
A Display Order Oriented Scalable Video Decoder
As network technologies advance, Scalable Video Coding (SVC) has become increasingly popular due to its universal multimedia access capability and competitive compression performan...
Jia-Bin Huang, Yu-Kun Lin, Tian-Sheuan Chang
ATAL
2005
Springer
15 years 6 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
« Prev « First page 2961 / 3303 Last » Next »