Sciweavers

2419 search results - page 379 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
IJCNN
2008
IEEE
14 years 3 months ago
A formula of equations of states in singular learning machines
Abstract— Almost all learning machines used in computational intelligence are not regular but singular statistical models, because they are nonidentifiable and their Fisher info...
Sumio Watanabe
IJCNN
2007
IEEE
14 years 3 months ago
Evaluation of Performance Measures for SVR Hyperparameter Selection
— To obtain accurate modeling results, it is of primal importance to find optimal values for the hyperparameters in the Support Vector Regression (SVR) model. In general, we sea...
Koen Smets, Brigitte Verdonk, Elsa Jordaan
DSOM
2007
Springer
14 years 3 months ago
On the Risk Exposure and Priority Determination of Changes in IT Service Management
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
Jacques Philippe Sauvé, Rodrigo A. Santos, ...
ISNN
2005
Springer
14 years 2 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ICPR
2008
IEEE
14 years 3 months ago
Human reappearance detection based on on-line learning
Many video surveillance applications require detecting human reappearances in a scene monitored by a camera or over a network of cameras. This is the human reappearance detection ...
Lei Hu, Yizhou Wang, Shuqiang Jiang, Qingming Huan...