Sciweavers

1116 search results - page 101 / 224
» A Comparative Evaluation of Term Recognition Algorithms
Sort
View
GECCO
2006
Springer
128views Optimization» more  GECCO 2006»
15 years 8 months ago
FTXI: fault tolerance XCS in integer
In the realm of data mining, several key issues exists in the traditional classification algorithms, such as low readability, large rule number, and low accuracy with information ...
Hong-Wei Chen, Ying-Ping Chen
PR
2008
85views more  PR 2008»
15 years 4 months ago
Quadratic boosting
This paper presents a strategy to improve the AdaBoost algorithm with a quadratic combination of base classifiers. We observe that learning this combination is necessary to get be...
Thang V. Pham, Arnold W. M. Smeulders
IJON
2010
189views more  IJON 2010»
15 years 3 months ago
Inference and parameter estimation on hierarchical belief networks for image segmentation
We introduce a new causal hierarchical belief network for image segmentation. Contrary to classical tree structured (or pyramidal) models, the factor graph of the network contains...
Christian Wolf, Gérald Gavin
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 11 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao