Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
We study a method of optimal data-driven aggregation of classifiers in a convex combination and establish tight upper bounds on its excess risk with respect to a convex loss funct...
: It is known that graphic interfaces using electromyogram (EMG) generated by wrist motion are a potentially viable for a wearable computer. However, these interface prototypes see...
In this paper, we discuss the benefits of context prediction for an industrial application in open cast mining. The goal of context prediction is not only to recognize the current...
In gene expression microarray data analysis, selecting a small number of discriminative genes from thousands of genes is an important problem for accurate classification of diseas...