Sciweavers

1997 search results - page 367 / 400
» A Model for Data Leakage Detection
Sort
View
IJRR
2007
90views more  IJRR 2007»
13 years 11 months ago
Assessment of Tissue Damage due to Mechanical Stresses
t – While there are many benefits to minimally invasive surgery, force feedback, or touch sensation, is lacking in the currently available MIS tools, including surgical robots, c...
Smita De, Jacob Rosen, Aylon Dagan, Blake Hannafor...
TNN
2008
181views more  TNN 2008»
13 years 11 months ago
Optimized Approximation Algorithm in Neural Networks Without Overfitting
In this paper, an optimized approximation algorithm (OAA) is proposed to address the overfitting problem in function approximation using neural networks (NNs). The optimized approx...
Yinyin Liu, Janusz A. Starzyk, Zhen Zhu
ENTCS
2002
145views more  ENTCS 2002»
13 years 10 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
CSDA
2007
152views more  CSDA 2007»
13 years 10 months ago
Robust variable selection using least angle regression and elemental set sampling
In this paper we address the problem of selecting variables or features in a regression model in the presence of both additive (vertical) and leverage outliers. Since variable sel...
Lauren McCann, Roy E. Welsch
PAMI
2002
112views more  PAMI 2002»
13 years 10 months ago
Feature Space Trajectory Methods for Active Computer Vision
We advance new active object recognition algorithms that classify rigid objects and estimate their pose from intensity images. Our algorithms automatically detect if the class or p...
Michael A. Sipe, David Casasent