Pattern search

Results: 140



#Item
21SpADe: On Shape-based Pattern Detection in Streaming Time Series Yueguo Chen§ Mario A. Nascimento†∗ §

SpADe: On Shape-based Pattern Detection in Streaming Time Series Yueguo Chen§ Mario A. Nascimento†∗ §

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-11-21 02:44:25
22August 8, :30 WSPC/115-IJPRAIInternational Journal of Pattern Recognition and Artificial Intelligence Vol. 16, No–619

August 8, :30 WSPC/115-IJPRAIInternational Journal of Pattern Recognition and Artificial Intelligence Vol. 16, No–619

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
23ACCELERATING MULTIMODAL SEQUENCE RETRIEVAL WITH CONVOLUTIONAL NETWORKS Laboratory for the Recognition and Organization of Speech and Audio Colin Raffel () and Daniel P. W. Ellis (), L

ACCELERATING MULTIMODAL SEQUENCE RETRIEVAL WITH CONVOLUTIONAL NETWORKS Laboratory for the Recognition and Organization of Speech and Audio Colin Raffel () and Daniel P. W. Ellis (), L

Add to Reading List

Source URL: colinraffel.com

Language: English
24Introduction to Machine Learning What you can use it for • pattern recognition (faces, digits, speech), • bioinformatics (gene finding, introns) • internet (spam filtering, search engines) • prediction (stock mar

Introduction to Machine Learning What you can use it for • pattern recognition (faces, digits, speech), • bioinformatics (gene finding, introns) • internet (spam filtering, search engines) • prediction (stock mar

Add to Reading List

Source URL: alex.smola.org

Language: English - Date: 2013-09-09 02:28:41
    25The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed University of Illinois at Urbana-Champaign ABSTRACT Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there

    The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed University of Illinois at Urbana-Champaign ABSTRACT Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-07-05 14:57:39
    26Yannis Kalantidis National Technical University of Athens Email:  PhD thesis: Nearest Neighbor Search and Clustering for Large scale Visual Search Estimated graduation date: November 2014

    Yannis Kalantidis National Technical University of Athens Email: PhD thesis: Nearest Neighbor Search and Clustering for Large scale Visual Search Estimated graduation date: November 2014

    Add to Reading List

    Source URL: image.ntua.gr

    Language: English - Date: 2014-06-15 04:09:25
    27The Value of Using Intermediaries in a  Service-Oriented Architecture (SOA)

    The Value of Using Intermediaries in a Service-Oriented Architecture (SOA)

    Add to Reading List

    Source URL: www.search.org

    Language: English - Date: 2015-10-20 13:33:05
    28RecapFibonacci ..........

    RecapFibonacci ..........

    Add to Reading List

    Source URL: genome.sph.umich.edu

    Language: English - Date: 2013-02-05 09:59:31
    29Christopher Alexander The Search for Beauty STANFORD UNIVERSITY  1 of 165

    Christopher Alexander The Search for Beauty STANFORD UNIVERSITY 1 of 165

    Add to Reading List

    Source URL: www.dreamsongs.com

    Language: English - Date: 2012-08-04 15:54:02
    30MATHEMATICS AND LOGIC AS INFORMATION COMPRESSION BY MULTIPLE ALIGNMENT, UNIFICATION AND SEARCH J Gerard Wolff School of Informatics, University of Wales, Dean Street, Bangor, LL57 1UT, UK.

    MATHEMATICS AND LOGIC AS INFORMATION COMPRESSION BY MULTIPLE ALIGNMENT, UNIFICATION AND SEARCH J Gerard Wolff School of Informatics, University of Wales, Dean Street, Bangor, LL57 1UT, UK.

    Add to Reading List

    Source URL: www.cognitionresearch.org

    Language: English - Date: 2012-01-09 18:04:31