Sciweavers

292 search results - page 13 / 59
» Exploiting Dead Value Information
Sort
View
CLEF
2010
Springer
13 years 8 months ago
A Novel Structural-Description Approach for Image Retrieval
We tested our image classification methodology in the photo-annotation task of the ImageCLEF competition [Nowak, 2010] using a visual-only approach performing automated labeling. ...
Christoph Rasche, Constantin Vertan
ENTER
2006
Springer
13 years 11 months ago
Product Reviews in Travel Decision Making
Product reviews or user opinions represent a peculiar information source that can be exploited in supporting travel decision making. Product reviews provide other user's expe...
Francesco Ricci, René T. A. Wietsma
SIGPRO
2010
88views more  SIGPRO 2010»
13 years 5 months ago
Data compression using SVD and Fisher information for radar emitter location
: This paper presents a data compression method that can achieve a very large compression ratio for radar pulse trains that are to be used for time-difference-of-arrival/frequency-...
Mark L. Fowler, Mo Chen, J. Andrew Johnson, Zhen Z...
ITNG
2006
IEEE
14 years 1 months ago
Side-Channel Leakage Tolerant Architectures
Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede
GECCO
2003
Springer
117views Optimization» more  GECCO 2003»
14 years 21 days ago
A Method for Handling Numerical Attributes in GA-Based Inductive Concept Learners
This paper proposes a method for dealing with numerical attributes in inductive concept learning systems based on genetic algorithms. The method uses constraints for restricting th...
Federico Divina, Maarten Keijzer, Elena Marchiori