Sciweavers

315 search results - page 11 / 63
» Claims Analysis
Sort
View
NIPS
2008
13 years 11 months ago
From Online to Batch Learning with Cutoff-Averaging
We present cutoff averaging, a technique for converting any conservative online learning algorithm into a batch learning algorithm. Most online-to-batch conversion techniques work...
Ofer Dekel
PAMI
2006
155views more  PAMI 2006»
13 years 9 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
ICDAR
2003
IEEE
14 years 3 months ago
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis
Neural networks are a powerful technology for classification of visual inputs arising from documents. However, there is a confusing plethora of different neural network methods th...
Patrice Simard, David Steinkraus, John C. Platt
QOFIS
2004
Springer
14 years 3 months ago
Load Analysis of Topology-Unaware TDMA MAC Policies for Ad Hoc Networks
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
Konstantinos Oikonomou, Ioannis Stavrakakis
KBSE
2005
IEEE
14 years 3 months ago
Visualization-based analysis of quality for large-scale software systems
We propose an approach for complex software analysis based on visualization. Our work is motivated by the fact that in spite of years of research and practice, software developmen...
Guillaume Langelier, Houari A. Sahraoui, Pierre Po...