Sciweavers

580 search results - page 85 / 116
» An Efficient Implementation of an Active Set Method for SVMs
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 2 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
ECCV
2010
Springer
13 years 11 months ago
Anomalous Behaviour Detection using Spatiotemporal Oriented Energies, Subset Inclusion Histogram Comparison and Event-Driven Pro
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
BMCBI
2004
111views more  BMCBI 2004»
13 years 7 months ago
Multiclass discovery in array data
Background: A routine goal in the analysis of microarray data is to identify genes with expression levels that correlate with known classes of experiments. In a growing number of ...
Yingchun Liu, Markus Ringnér
GCC
2005
Springer
14 years 1 months ago
Using Fuzzy Cognitive Map to Effectively Classify E-Documents and Application
In the current Web, e-document has been the most common vehicle for delivering and exchanging information. As the amount of e-documents has grown enormously, effective classificati...
Jianzeng Wang, Yunpeng Xing, Peng Shi, Fei Guo, Zh...
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 7 months ago
SAT Solving for Argument Filterings
Abstract. This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for term...
Michael Codish, Peter Schneider-Kamp, Vitaly Lagoo...