Sciweavers

1765 search results - page 127 / 353
» Combinations of Weak Classifiers
Sort
View
INAP
2001
Springer
14 years 2 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
PRIS
2008
13 years 11 months ago
Comparison of Adaboost and ADTboost for Feature Subset Selection
Abstract. This paper addresses the problem of feature selection within classification processes. We present a comparison of a feature subset selection with respect to two boosting ...
Martin Drauschke, Wolfgang Förstner
NIPS
2004
13 years 11 months ago
An Application of Boosting to Graph Classification
This paper presents an application of Boosting for classifying labeled graphs, general structures for modeling a number of real-world data, such as chemical compounds, natural lan...
Taku Kudo, Eisaku Maeda, Yuji Matsumoto
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 10 months ago
Improvement on Nominative Proxy Signature Schemes
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In...
Zuo-Wen Tan
JNS
2008
44views more  JNS 2008»
13 years 10 months ago
The Scaling Attractor and Ultimate Dynamics for Smoluchowski's Coagulation Equations
We describe a basic framework for studying dynamic scaling that has roots in dynamical systems and probability theory. Within this framework, we study Smoluchowski's coagulat...
Govind Menon, Robert L. Pego