Abstract— We present a novel antenna and system architecture for mobile manipulation based on passive RFID technology operating in the 850MHz-950MHz ultra-high-frequency (UHF) sp...
Travis Deyle, Cressel D. Anderson, Charles C. Kemp...
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
In many data mining tools that support regression tasks, training data are stored in a single table containing both the target field (dependent variable) and the attributes (indepe...
The nearest- or near-neighbor query problems arise in a large variety of database applications, usually in the context of similarity searching. Of late, there has been increasing ...