Sciweavers

2995 search results - page 317 / 599
» On multi-avoidance of generalized patterns
Sort
View
86
Voted
CLEF
2009
Springer
15 years 1 months ago
Search Path Visualization and Session Performance Evaluation with Log Files
Our approach to the Log Analysis for Digital Societies (LADS) task of LogCLEF 2009 is to define three different levels of performance: success, failure and strong failure. To inve...
Katrin Lamm, Thomas Mandl, Ralph Koelle
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 27 days ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
ICASSP
2010
IEEE
15 years 27 days ago
Alpha-integration of multiple evidence
In pattern recognition, data integration is a processing method to combine multiple sources so that the combined result can be more accurate than a single source. Evidence theory ...
Heeyoul Choi, Anup Katake, Seungjin Choi, Yoonsuck...
104
Voted
CCR
2010
133views more  CCR 2010»
15 years 25 days ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
94
Voted
COGSCI
2010
88views more  COGSCI 2010»
15 years 25 days ago
Domain-Creating Constraints
The contributions to this special issue on cognitive development collectively propose ways in which learning involves developing constraints that shape subsequent learning. A lear...
Robert L. Goldstone, David Landy