Sciweavers

1642 search results - page 284 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 7 months ago
Mining emerging patterns by streaming feature selection
Building an accurate emerging pattern classifier with a highdimensional dataset is a challenging issue. The problem becomes even more difficult if the whole feature space is unava...
Kui Yu, Wei Ding 0003, Dan A. Simovici, Xindong Wu
ECCV
2008
Springer
16 years 6 months ago
A Probabilistic Cascade of Detectors for Individual Object Recognition
A probabilistic system for recognition of individual objects is presented. The objects to recognize are composed of constellations of features, and features from a same object shar...
Pierre Moreels, Pietro Perona
185
Voted
FOIKS
2008
Springer
16 years 1 months ago
Cost-minimising strategies for data labelling : optimal stopping and active learning
Supervised learning deals with the inference of a distribution over an output or label space $\CY$ conditioned on points in an observation space $\CX$, given a training dataset $D$...
Christos Dimitrakakis, Christian Savu-Krohn
IAT
2008
IEEE
15 years 11 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
ICEIS
2008
IEEE
15 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya