Sciweavers

148 search results - page 8 / 30
» Advantages of Using Feature Selection Techniques on Steganal...
Sort
View
PAMI
2002
78views more  PAMI 2002»
13 years 7 months ago
Robust Factorization
Factorization algorithms for recovering structure and motion from an image stream have many advantages, but they usually require a set of well tracked features. Such a set is in g...
Henrik Aanæs, Rune Fisker, Kalle Åstr&...
ACL
2010
13 years 5 months ago
A Study of Information Retrieval Weighting Schemes for Sentiment Analysis
Most sentiment analysis approaches use as baseline a support vector machines (SVM) classifier with binary unigram weights. In this paper, we explore whether more sophisticated fea...
Georgios Paltoglou, Mike Thelwall
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 8 months ago
Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 8 months ago
The Use of Probabilistic Systems to Mimic the Behaviour of Idiotypic AIS Robot Controllers
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
IACR
2011
125views more  IACR 2011»
12 years 7 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...