Sciweavers

1068 search results - page 102 / 214
» Extremely randomized trees
Sort
View
ECRIME
2007
14 years 1 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
WSC
2007
14 years 10 days ago
Clinic: correlated inputs in an automotive paint shop fire risk simulation
General Motors (GM) has developed a first proof-ofconcept simulation model to explore impacts of various fire events in automotive paint shop operations. The approach uses a chron...
Debra A. Elkins, A. Christine LaFleur, Earnest Fos...
ENGL
2007
91views more  ENGL 2007»
13 years 10 months ago
RRT-based strategies for sensor-based exploration
—Real mobile robots should be able to build an abstract representation of the physical environment, in order to navigate and to work in such environment. We present a method for ...
Abraham Sánchez López, Judith Le&oac...
ECCV
2006
Springer
14 years 12 months ago
Feature Harvesting for Tracking-by-Detection
We propose a fast approach to 3?D object detection and pose estimation that owes its robustness to a training phase during which the target object slowly moves with respect to the ...
Mustafa Özuysal, Vincent Lepetit, Franç...
ESA
2008
Springer
115views Algorithms» more  ESA 2008»
13 years 11 months ago
Deterministic Sampling Algorithms for Network Design
For several NP-hard network design problems, the best known approximation algorithms are remarkably simple randomized algorithms called Sample-Augment algorithms in [11]. The algor...
Anke van Zuylen