Sciweavers

2006 search results - page 389 / 402
» Classification and feature selection with human performance ...
Sort
View
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
14 years 1 months ago
A foveated passive UHF RFID system for mobile manipulation
Abstract— We present a novel antenna and system architecture for mobile manipulation based on passive RFID technology operating in the 850MHz-950MHz ultra-high-frequency (UHF) sp...
Travis Deyle, Cressel D. Anderson, Charles C. Kemp...
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
14 years 7 months ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
ILP
2003
Springer
14 years 18 days ago
Mining Model Trees: A Multi-relational Approach
In many data mining tools that support regression tasks, training data are stored in a single table containing both the target field (dependent variable) and the attributes (indepe...
Annalisa Appice, Michelangelo Ceci, Donato Malerba
VLDB
1999
ACM
118views Database» more  VLDB 1999»
13 years 11 months ago
Similarity Search in High Dimensions via Hashing
The nearest- or near-neighbor query problems arise in a large variety of database applications, usually in the context of similarity searching. Of late, there has been increasing ...
Aristides Gionis, Piotr Indyk, Rajeev Motwani