Sciweavers

2468 search results - page 444 / 494
» Aggregation operators 2003
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 8 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
MANSCI
2008
68views more  MANSCI 2008»
13 years 8 months ago
Product-Line Competition: Customization vs. Proliferation
Abstract Consumers are increasingly demanding products that closely match their individual preferences, and advances in manufacturing and information technologies have made it poss...
Haim Mendelson, Ali K. Parlaktürk
JMIV
2007
158views more  JMIV 2007»
13 years 8 months ago
On the Consistency of the Normalized Eight-Point Algorithm
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized data [IEEE Trans. Pattern Anal. Mach. Intell., 25(9...
Wojciech Chojnacki, Michael J. Brooks
AI
2004
Springer
13 years 8 months ago
A unifying semantics for time and events
We give a formal semantics for a highly expressive language for representing temporal relationships and events. This language, which we call Versatile Event Logic (VEL), provides ...
Brandon Bennett, Antony Galton
ICASSP
2011
IEEE
13 years 16 days ago
Application specific loss minimization using gradient boosting
Gradient boosting is a flexible machine learning technique that produces accurate predictions by combining many weak learners. In this work, we investigate its use in two applica...
Bin Zhang, Abhinav Sethy, Tara N. Sainath, Bhuvana...