Sciweavers

1020 search results - page 182 / 204
» Learning to Use Operational Advice
Sort
View
IJON
2010
148views more  IJON 2010»
13 years 7 months ago
Modeling radiation-induced lung injury risk with an ensemble of support vector machines
Radiation-induced lung injury, radiation pneumonitis (RP), is a potentially fatal side-effect of thoracic radiation therapy. In this work, using an ensemble of support vector mac...
Todd W. Schiller, Yixin Chen, Issam El-Naqa, Josep...
PKDD
2010
Springer
148views Data Mining» more  PKDD 2010»
13 years 7 months ago
Exploiting Causal Independence in Markov Logic Networks: Combining Undirected and Directed Models
Abstract. A new method is proposed for compiling causal independencies into Markov logic networks (MLNs). An MLN can be viewed as compactly representing a factorization of a joint ...
Sriraam Natarajan, Tushar Khot, Daniel Lowd, Prasa...
ASIACRYPT
2010
Springer
13 years 6 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
GIS
2010
ACM
13 years 6 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting
IJICTHD
2010
71views more  IJICTHD 2010»
13 years 6 months ago
Automatic Language Translation for Mobile SMS
Currently mobile users engage the services of a third party provider to translate an SMS text into a different language. The existing services have a number of drawbacks e.g. high ...
Swadesh Kumar Samanta, A. Achilleos, Sandro Moiron...