Sciweavers

3556 search results - page 689 / 712
» Can machine learning be secure
Sort
View
ARTMED
2002
76views more  ARTMED 2002»
13 years 7 months ago
Logistic-based patient grouping for multi-disciplinary treatment
Present-day healthcare witnesses a growing demand for coordination of patient care. Coordination is needed especially in those cases in which hospitals have structured healthcare ...
Laura Maruster, Ton Weijters, Geerhard de Vries, A...
COLING
2002
13 years 7 months ago
The LinGO Redwoods Treebank: Motivation and Preliminary Applications
The LinGO Redwoods initiative is a seed activity in the design and development of a new type of treebank. While several medium- to large-scale treebanks exist for English (and for...
Stephan Oepen, Kristina Toutanova, Stuart M. Shieb...
PRL
2010
159views more  PRL 2010»
13 years 6 months ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith
VR
2010
IEEE
174views Virtual Reality» more  VR 2010»
13 years 6 months ago
Breaking the status quo: Improving 3D gesture recognition with spatially convenient input devices
We present a systematic study on the recognition of 3D gestures using spatially convenient input devices. Specifically, we examine the linear acceleration-sensing Nintendo Wii Re...
Michael Hoffman, Paul Varcholik, Joseph J. LaViola...
WCRE
2010
IEEE
13 years 6 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle