Sciweavers

2631 search results - page 459 / 527
» SVM Based Learning System for Information Extraction
Sort
View
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 1 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
KDD
2012
ACM
183views Data Mining» more  KDD 2012»
13 years 6 months ago
Mining discriminative components with low-rank and sparsity constraints for face recognition
This paper introduces a novel image decomposition approach for an ensemble of correlated images, using low-rank and sparsity constraints. Each image is decomposed as a combination...
Qiang Zhang, Baoxin Li
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 10 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
LCN
2006
IEEE
15 years 10 months ago
Wireless Sensor Networks: The Quest for Planetary Field Sensing
— The paper presents a thought experiment as to the feasibility of using large scale wireless sensor networks as a vehicle for high level scientific investigation. The discussion...
Elena I. Gaura, Robert M. Newman
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad