138 Hits in 3.7 sec

Computer-assisted conversation for nonvocal people using prestored texts

N. Aim, J.L. Arnott
1998 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
then is in the storage and retrieval of large amounts of reusable text.  ...  information retrieval, and building a system based on scripts, plans, and goals.  ...  It was important to retain an easy-to-use user interface that did not require a large effort from the user to produce appropriate texts.  ... 
doi:10.1109/5326.704557 fatcat:oigdwgujrfglroixkvrnji6k6y

A new approach to online generation of association rules

C.C. Aggarwal, P.S. Yu
2001 IEEE Transactions on Knowledge and Data Engineering  
The algorithm also supports techniques for quickly discovering association rules from large itemsets. The algorithm is capable of finding rules with specific items in the antecedent or consequent.  ...  AbstractÐWe discuss the problem of online mining of association rules in a large database of sales transactions.  ...  In other words, the problem of mining association rules may require considerable manual parameter tuning by repeated queries before useful business information can be gleaned from the transaction database  ... 
doi:10.1109/69.940730 fatcat:wt5giyorzjgzlaoefq67c6rhme

An expectation-driven response understanding paradigm

Dong-Guk Shin
1994 IEEE Transactions on Knowledge and Data Engineering  
The system then uses the expectation as the focus to perform the most likely interpretation of the user's response. Without using such a focus the interpretation process could be unbounded.  ...  The interpretation process results in identifying a particular expectation-response relationship type, which the system can use to tailor its response strategy with respect to the given userresponse.  ...  Applying transformation operators requires access to the prestored knowledge base as well as the supporting database.  ... 
doi:10.1109/69.334859 fatcat:cz3grmfo2zc2hiz3wcgjljtmzu

Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

Chun-Wei Lin, Binbin Zhang, Kuo-Tung Yang, Tzung-Pei Hong
2014 The Scientific World Journal  
Data mining is used to mine meaningful and useful information or knowledge from a very large database.  ...  Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy.  ...  [1, [34] [35] [36] [37] is progressively developed to extract useful and meaningful information or rules from a very large database.  ... 
doi:10.1155/2014/398269 pmid:25254239 pmcid:PMC4165802 fatcat:jh3nzhatvjc3zksjclhalmifjy

Optimization of association rule mining

Polla A. Fatah, Ibrahim Hamarash
2015 2015 Internet Technologies and Applications (ITA)  
Through extensive experiments using benchmark data sets we demonstrate that the COLARM optimizer is highly accurate in online plan selection and discovering localized rules (otherwise hidden in the global  ...  Association rule mining typically focuses on discovering global rules valid across the entire dataset.  ...  The offline preprocessing phase computes and stores the itemset information using efficient index structures called the MIP-index (explained in Section 3.3).  ... 
doi:10.1109/itecha.2015.7317409 fatcat:dqlo2u3lmjfbpc4cjlusgh64hy

Research and Reviews in Question Answering System

Sanjay K. Dwivedi, Vaishali Singh
2013 Procedia Technology - Elsevier  
Modern information retrieval systems allow us to locate documents that might have the associated information, but the majority of them leave it to the user to extract the useful information from an ordered  ...  ., ELIZA [2] and GUS [4] also used structured database as the knowledge source.  ... 
doi:10.1016/j.protcy.2013.12.378 fatcat:6px3nuaha5h4zh53ae6oyt4yei

Host-Based Anomaly Intrusion Detection [chapter]

Jiankun Hu
2010 Handbook of Information and Communication Security  
This pattern will be prestored in the database.  ...  about the mem- ory used by the process such as cur- rent memory used, peak memory used, and virtual memory used I/O information Include information about input/ output operations such as read, write  ...  The Author Jiankun Hu obtained his master degree from the Department of Computer Science and Software Engineering of Monash University, Australia, and his PhD degree from Control Engineering, Harbin Institute  ... 
doi:10.1007/978-3-642-04117-4_13 fatcat:6tbs2h6f5re2zjedwkwrqprwfq

Biometric Identification

Donald R. Richards
1997 Information Systems Security  
characteristic with the person's own biometric template(s) prestored in the database.  ...  from a large number of identities with an extremely high level of confidence.  ... 
doi:10.1080/10658989709342534 fatcat:maumsv2cyzb6lnqz2riggjj2xy

Biometric Identification [chapter]

Donald Richards
2000 Information Security Management Handbook, Four Volume Set  
from a large number of identities with an extremely high level of confidence.  ...  Initial available results on accuracy and speed of iris-based identification are promising and point to the feasibility of a large-scale recognition using iris information.  ... 
doi:10.1201/9780203325438.ch9 fatcat:3qceqp35dzdyjn2aprtq56lmey

Biometric Identification

2003 Sensor Review  
characteristic with the person's own biometric template(s) prestored in the database.  ...  from a large number of identities with an extremely high level of confidence.  ... 
doi:10.1108/sr.2003.08723dad.009 fatcat:ck7xswein5fzxd6ige5iavpzsq

Biometric Identification [chapter]

2013 Advances in Biometrics for Secure Human Authentication and Recognition  
characteristic with the person's own biometric template(s) prestored in the database.  ...  from a large number of identities with an extremely high level of confidence.  ... 
doi:10.1201/b16247-14 fatcat:z23cwye45jcvdaymelrzzffjeu

A graphics interface for linear programming

Pai-Chun Ma, Frederic H. Murphy, Edward A. Stohr
1989 Communications of the ACM  
ICnowledge-based techniques are then used to interpret this problem statement, to build an internal representation of the model, and to generate the required input for an LP soiver.  ...  , by specifying prestored tables or by database queries.  ...  LPFORM itself, can use knowledge of the structure of the database at many points in the inference process.  ... 
doi:10.1145/65971.65978 fatcat:s65inknbw5dxxkuyuc3zsgi4ny

ORDB, HORDE, ODORactor and other on-line knowledge resources of olfactory receptor-odorant interactions

Luis Marenco, Rixin Wang, Robert McDougal, Tsviya Olender, Michal Twik, Elspeth Bruford, Xinyi Liu, Jian Zhang, Doron Lancet, Gordon Shepherd, Chiquito Crasto
2016 Database: The Journal of Biological Databases and Curation  
ODORactor ( ODORactor/) provides information related to OR-odorant interactions from the perspective of the odorant.  ...  ORDB, HORDE, ODORactor and other on-line knowledge resources of olfactory receptor-odorant interactions.  ...  An ad hoc, multi-parameter search is critical for datasets with a large number of parameters and entries, and mitigates the need to scroll through several pages, or have prior knowledge of the information  ... 
doi:10.1093/database/baw132 pmid:27694208 pmcid:PMC5045865 fatcat:es3j5ulb4resbhbyg6z4b5s7qi


Abhishek Mukherji, Xika Lin, Jason Whitehouse, Christopher R. Botaish, Elke A. Rundensteiner, Matthew O. Ward
2013 Proceedings of the 22nd ACM international conference on Conference on information & knowledge management - CIKM '13  
Overall, this research encompasses significant contributions at the intersection of data mining, knowledge management and visual analytics.  ...  Our user study with 22 subjects establishes the usability and effectiveness of the proposed features and interactions of FIRE using benchmark datasets.  ...  discover genuinely interesting ones.  ... 
doi:10.1145/2505515.2505631 dblp:conf/cikm/MukherjiLWBRW13 fatcat:aooygivggre2hij5auyjll6wdm

Semantic memory and the granularity of semantic relations: Evidence from speed-accuracy decomposition

John Kounios, Elizabeth C. Montgomery, Roderick W. Smith
1994 Memory & Cognition  
This general approach does a reasonably good job of accounting for the database of empirical results from sentence-verification experiments (Chang, 1986) .  ...  However, almost all of these studies used sentences involving class-inclusion relations (e.g., "All dogs are animals").  ...  In other words, continuous, fine-grain information cannot result from computations involving discrete, large-chunk information, unless the latter has an internal structure allowing it to be decomposed  ... 
doi:10.3758/bf03209258 pmid:7808282 fatcat:i4jcexrf5jciphs7bonl53d5rm
« Previous Showing results 1 — 15 out of 138 results