Sciweavers

425 search results - page 66 / 85
» An approach to the evaluation of the performance of a discre...
Sort
View
PLDI
2012
ACM
11 years 10 months ago
Automated error diagnosis using abductive inference
When program verification tools fail to verify a program, either the program is buggy or the report is a false alarm. In this situation, the burden is on the user to manually cla...
Isil Dillig, Thomas Dillig, Alex Aiken
ICCV
2009
IEEE
15 years 15 days ago
Deformable Model Fitting with a Mixture of Local Experts
Local experts have been used to great effect for fitting deformable models to images. Typically, the best location in an image for the deformable model’s landmarks are found t...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn
JMLR
2006
125views more  JMLR 2006»
13 years 7 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...
CEC
2010
IEEE
13 years 5 months ago
A grammar based Ant Programming algorithm for mining classification rules
This paper focuses on the application of a new ACO-based automatic programming algorithm to the classification task of data mining. This new model, called GBAP algorithm, is based ...
Juan Luis Olmo, José Raúl Romero, Se...
ICNP
2009
IEEE
14 years 2 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...