Sciweavers

1056 search results - page 37 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ICML
2003
IEEE
14 years 8 months ago
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods
We analyze the formal grounding behind Negative Correlation (NC) Learning, an ensemble learning technique developed in the evolutionary computation literature. We show that by rem...
Gavin Brown, Jeremy L. Wyatt
WWW
2003
ACM
14 years 8 months ago
Data-Sharing Relationships in the Web
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
Adriana Iamnitchi, Matei Ripeanu, Ian T. Foster
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
CSSE
2008
IEEE
14 years 2 months ago
The Mechanisms of Learning and the Survival of New Ventures
There are two main activities in entrepreneurial process associated with the survival of new ventures: coping with the liabilities of newness and exploit competitive advantage. Ent...
Deng Yingyu, Wang Ye
ICPR
2008
IEEE
14 years 2 months ago
Flexible object recognition in cluttered scenes using relative point distribution models
This paper introduces an edge-based object recognition method that is robust with respect to clutter, occlusion and object deformations. The method combines the use of local featu...
Alexandros Bouganis, Murray Shanahan