Sciweavers

1765 search results - page 111 / 353
» Combinations of Weak Classifiers
Sort
View
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 4 months ago
Two-phase schema matching in real world relational databases
— We propose a new approach to the problem of schema matching in relational databases that merges the hybrid and composite approach of combining multiple individual matching tech...
Nikolaos Bozovic, Vasilis Vassalos
BIBE
2008
IEEE
150views Bioinformatics» more  BIBE 2008»
13 years 10 months ago
Automatic DNA microarray gridding based on Support Vector Machines
This paper presents a novel method for DNA microarray gridding based on Support Vector Machine (SVM) classifiers. It employs a set of soft-margin SVMs to estimate the lines of the ...
Dimitris G. Bariamis, Dimitris Maroulis, Dimitrios...
EUC
2008
Springer
13 years 11 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
IPL
2006
87views more  IPL 2006»
13 years 10 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
ACCV
2010
Springer
13 years 5 months ago
Learning Rare Behaviours
Abstract. We present a novel approach to detect and classify rare behaviours which are visually subtle and occur sparsely in the presence of overwhelming typical behaviours. We tre...
Jian Li, Timothy M. Hospedales, Shaogang Gong, Tao...