Background: Independent Component Analysis (ICA) proves to be useful in the analysis of neural activity, as it allows for identification of distinct sources of activity. Applied t...
Tomasz G. Smolinski, Roger Buchanan, Grzegorz M. B...
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
Our paper addresses the problem of enforcing constraints in human body tracking. A projection technique is derived to impose kinematic constraints on independent multi-body motion...
The naive Bayesian classifier provides a simple and effective approach to classifier learning, but its attribute independence assumption is often violated in the real world. A numb...