Sciweavers

1512 search results - page 206 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
KDD
2004
ACM
158views Data Mining» more  KDD 2004»
16 years 2 months ago
A generalized maximum entropy approach to bregman co-clustering and matrix approximation
Co-clustering is a powerful data mining technique with varied applications such as text clustering, microarray analysis and recommender systems. Recently, an informationtheoretic ...
Arindam Banerjee, Inderjit S. Dhillon, Joydeep Gho...
106
Voted
DRM
2007
Springer
15 years 8 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
117
Voted
IUI
2004
ACM
15 years 7 months ago
Exploiting emotions to disambiguate dialogue acts
This paper describes an attempt to reveal the user’s intention from dialogue acts, thereby improving the effectiveness of natural interfaces to pedagogical agents. It focuses o...
Wauter Bosma, Elisabeth André
123
Voted
VIZSEC
2004
Springer
15 years 7 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 8 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White