Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
—Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human whose phys...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...
Abstract— Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
Like many purely data-driven machine learning methods, Support Vector Machine (SVM) classifiers are learned exclusively from the evidence presented in the training dataset; thus ...