Sciweavers

2176 search results - page 324 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
KDD
1998
ACM
106views Data Mining» more  KDD 1998»
15 years 7 months ago
Simultaneous Reliability Evaluation of Generality and Accuracy for Rule Discovery in Databases
This paper presents an algorithm for discovering conjunction rules with high reliability from data sets. The discovery of conjunction rules, each of which is a restricted form of ...
Einoshin Suzuki
DASFAA
2009
IEEE
96views Database» more  DASFAA 2009»
15 years 7 months ago
A Revisit of Query Expansion with Different Semantic Levels
Abstract. Query expansion has received extensive attention in information retrieval community. Although semantic based query expansion appears to be promising in improving retrieva...
Ce Zhang, Bin Cui, Gao Cong, Yu-Jing Wang
133
Voted
AVSS
2006
IEEE
15 years 7 months ago
High-Quality Real Time Motion Detection Using PTZ Cameras
The approaches based on background difference are the most used with fixed cameras to perform motion detection, because of the high quality of the segmentation achieved. However, ...
Alessandro Bevilacqua, Pietro Azzari
AIIA
1995
Springer
15 years 7 months ago
Learning Programs in Different Paradigms using Genetic Programming
Genetic Programming (GP) is a method of automatically inducing programs by representing them as parse trees. In theory, programs in any computer languages can be translated to par...
Man Leung Wong, Kwong-Sak Leung
CASES
2005
ACM
15 years 5 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...