• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 88
Next 10 →

Authority-shift clustering: Hierarchical clustering by authority seeking on graphs. CVPR

by Minsu Cho, Kyoung Mu Lee , 2010
"... In this paper, a novel hierarchical clustering method using link analysis techniques is introduced. The algorithm is formulated as an authority seeking procedure on graphs, which computes the shifts toward nodes with high authority scores. For the authority shift, we adopted the person-alized PageRa ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
In this paper, a novel hierarchical clustering method using link analysis techniques is introduced. The algorithm is formulated as an authority seeking procedure on graphs, which computes the shifts toward nodes with high authority scores. For the authority shift, we adopted the person-alized Page

G.: Dynamically Adjustable Approach through Obfuscation Type Recognition—Notebook for PAN at CLEF 2015. In: [8

by Miguel A Sanchez-Perez , Alexander Gelbukh , Grigori Sidorov
"... Abstract. The task of (monolingual) text alignment consists in finding similar text fragments between two given documents. It has applications in plagiarism detection, detection of text reuse, author identification, authoring aid, and information retrieval, to mention only a few. We describe our ap ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
verbatim detection method and extended the decision making regarding which approach or output to use. We improve significantly the performance regarding our previous PAN 2014 approach and hence, our approach outperforms the best-performing system of the PAN 2014. Our system is available open source.

Semi-Supervised Clustering Approach for P300 based BCI Speller Systems

by Eep Kaur, A. K. Soni, M. Qasim Rafiq
"... Abstract — The paper presents a k-means based semi-supervised clustering approach for recognizing and classifying P300 signals for BCI Speller System. P300 signals are proved to be the most suitable Event Related Potential (ERP) signal, used to develop the BCI systems. Due to non-stationary nature o ..."
Abstract - Add to MetaCart
of ERP signals, the wavelet transform is the best analysis tool for extracting informative features from P300 signals. The focus of the research is on semisupervised clustering as supervised clustering approach need large amount of labeled data for training, which is a tedious task. Hence works for small

Using Hybrid Similarity Methods for Plagiarism Detection. Notebook for PAN at CLEF 2013

by Yurii Palkovskii, Alexei Belov - In [12 , 2013
"... Abstract. At PAN2013 we decided to focus entirely on Text Alignment subtask. Following our previous experience at PAN2012 and CLINSS2012, we decided to put together the approaches we used in previous year to face the new challenges of PAN2013. This year competition added new way of plagiarism obfusc ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
text summarizer. Euclidian distance based clusterization with additional custom filters method was used as our cluster merging technique. During the training stage we used the PAN 2012\PAN2013 provided data and performance measures scripts incorporated with genetic algorithm for best parameter tuning

Author(s) Name(s) Author Affiliation(s)

by unknown authors
"... Visual concept detection is one of the most important tasks in image and video indexing. This paper describes our system in the ImageCLEF Visual Concept Detection Task 2010 which ranked first for large-scale visual concept detection tasks in terms of Equal Error Rate (EER) and Area under Curve (AUC) ..."
Abstract - Add to MetaCart
learning. The main novelty is the classifierlevel and kernel-level fusion using Kernel Discriminant Analysis with RBF/Power Chi-Squared kernels obtained from various image descriptors. For 32 out of 53 individual concepts, we obtain the best performance of all 12 submissions to this task. 1.

Decomposition Analysis and Machine Learning in a Workflow-Forecast Approach to the Task Scheduling Problem for High-Loaded Distributed Systems

by Andrey Vladimirovich Gritsenko, Nikita Georgievich Demurchev, Vladimir Vyacheslavovich Kopytov, Andrey Olegovich Shulgin
"... The aim of this paper is to provide a description of machine learning based scheduling approach for high-loaded distributed systems that have patterns of tasks/queries that occur recurrently in workflow. The core of this approach is to predict the future workflow of the system depending on previous ..."
Abstract - Add to MetaCart
tasks/queries using supervised learning. First of all, the workflow is analyzed using hierarchical clustering to reveal sets of tasks/queries. Revealed sets of tasks/queries then undergo restructuring to represent patterns of recurrent tasks/queries. Later these patterns become the object

Recent Trends in Digital Text Forensics and its Evaluation Plagiarism Detection, Author Identification, and Author Profiling

by Francisco Rangel, Paolo Rosso, Efstathios Stamatatos, Benno Stein
"... Abstract This paper outlines the concepts and achievements of our evaluation lab on digital text forensics, PAN 13, which called for original research and de-velopment on plagiarism detection, author identification, and author profiling. We present a standardized evaluation framework for each of the ..."
Abstract - Add to MetaCart
the largest collection of state-of-the-art approaches with regard to the mentioned tasks for further analysis at our disposal. 1

A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks

by R. Geetha, E. Kannan
"... AbstractWireless Sensor Networks(WSN) used in a variety of applications are usually unattended in nature and are highly susceptible to attacks such as eavesdropping, hardware tampering and false messages. For secure communication among the nodes, Secret key cryptography is used since it provides hig ..."
Abstract - Add to MetaCart
and the transitory master key. The security analysis shows that our approach provides enhanced resilience and better connectivity by establishing secure channels among the communicating nodes in a hierarchical clustered wireless sensor network. It over persuades the state-of-the-art protocols by providing always

Analysis of Information Visualization Techniques for Abstract data on Mobile Devices

by U S Junghare , Dr V M Thakare , Dr S S Sherekar
"... ABSTRACT To perform visualization on mobile devices different types of data may use like text, picture, maps, physical objects, abstract data etc. According to data visualization is categorized in two areas of visualization that is, scientific visualization and information visualization. Scientific ..."
Abstract - Add to MetaCart
. INFORMATION VISUALIZATION AND ABSTRACT DATA [11]. Author [17] discus the different interface approaches for focus and contextual view i.e. overview-details, zooming, focus-context for desktop applications. To perform vehicle navigation on mobile devices different techniques has been used that are spatial

unknown title

by Krisztian Balog, Jiyin He, Katja Hofmann, Valentin Jijkoun, Christof Monz, Manos Tsagkias, Wouter Weerkamp, Maarten Rijke
"... In this paper we describe our participation in the Second Web People Search workshop (WePS2) and detail our approaches. For the clustering task, our focus was on replicating the lessons learned at WEPS1 on the data set made available as part of WEPS2 and on experimenting with a voting-based combinat ..."
Abstract - Add to MetaCart
-based combination of clustering methods. We found that clustering methods display the same overall behavior on the WEPS1 and WESP2 data sets and that a hierarchical clustering approach delivers the best performance, even outperforming voting-based combinations. For attribute extraction, we explore approaches using
Next 10 →
Results 1 - 10 of 88
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University