Sciweavers

2176 search results - page 270 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
WEA
2005
Springer
91views Algorithms» more  WEA 2005»
15 years 9 months ago
The Necessity of Timekeeping in Adversarial Queueing
We study queueing strategies in the adversarial queueing model. Rather than discussing individual prominent queueing strategies we tackle the issue on a general level and analyze c...
Maik Weinard
139
Voted
DSMML
2004
Springer
15 years 9 months ago
Extensions of the Informative Vector Machine
The informative vector machine (IVM) is a practical method for Gaussian process regression and classification. The IVM produces a sparse approximation to a Gaussian process by com...
Neil D. Lawrence, John C. Platt, Michael I. Jordan
ESWS
2004
Springer
15 years 9 months ago
The HCONE Approach to Ontology Merging
Existing efforts on ontology mapping, alignment and merging vary from methodological and theoretical frameworks, to methods and tools that support the semi-automatic coordination o...
Konstantinos Kotis, George A. Vouros
IDEAL
2004
Springer
15 years 9 months ago
Mobile Data Mining by Location Dependencies
Mobile mining is about finding useful knowledge from the raw data produced by mobile users. The mobile environment consists of a set of static device and mobile device. Previous wo...
Jen Ye Goh, David Taniar
ICDAR
2003
IEEE
15 years 9 months ago
Postal Envelope Segmentation by 2-D Histogram Clustering through Watershed Transform
In this paper we present a new postal envelope segmentation method based on 2-D histogram clustering and watershed transform. Segmentation task consists in detecting the modes ass...
Eduardo Akira Yonekura, Jacques Facon