Sciweavers

2176 search results - page 254 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
ISD
1999
Springer
213views Database» more  ISD 1999»
15 years 8 months ago
A Probabilistic Approach to Environmental Change Detection with Area-Class Map Data
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...
JMLR
2006
131views more  JMLR 2006»
15 years 3 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
JODL
2000
76views more  JODL 2000»
15 years 3 months ago
Strategy-based interactive cluster visualization for information retrieval
Abstract. In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3-dimensional s...
Anton Leuski, James Allan
TSD
2010
Springer
15 years 2 months ago
Diagnostics for Debugging Speech Recognition Systems
Modern speech recognition applications are becoming very complex program packages. To understand the error behaviour of the ASR systems, a special diagnosis - a procedure or a tool...
Milos Cernak
IACR
2011
97views more  IACR 2011»
14 years 3 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen