Sciweavers

648 search results - page 9 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 11 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
BIOID
2008
178views Biometrics» more  BIOID 2008»
13 years 9 months ago
Biometric System Based on Voice Recognition Using Multiclassifiers
In this paper we present a new speaker recognition system based on the fusion of two identification classifiers followed by a verification step. The user pronounces two passwords: ...
Mohamed Chenafa, Dan Istrate, Valeriu Vrabie, Mich...
PR
2008
97views more  PR 2008»
13 years 7 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
COSIT
2003
Springer
145views GIS» more  COSIT 2003»
14 years 23 days ago
Extracting Landmarks with Data Mining Methods
Abstract. The navigation task is a very demanding application for mobile users. The algorithms of present software solutions are based on the established methods of car navigation ...
Birgit Elias
KDD
2002
ACM
184views Data Mining» more  KDD 2002»
14 years 8 months ago
Associative Classifiers for Medical Images
This paper presents two classification systems for medical images based on association rule mining. The system we propose consists of: a pre-processing phase, a phase for mining th...
Alexandru Coman, Maria-Luiza Antonie, Osmar R. Za&...