Sciweavers

2055 search results - page 356 / 411
» Nested support vector machines
Sort
View
SAC
2008
ACM
13 years 8 months ago
Author identification using writer-dependent and writer-independent strategies
In this work we discuss author identification for documents written in Portuguese. Two different approaches were compared. The first is the writer-independent model which reduces ...
Daniel Pavelec, Edson J. R. Justino, Leonardo Vida...
ICPR
2010
IEEE
13 years 8 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
ICRA
2010
IEEE
164views Robotics» more  ICRA 2010»
13 years 7 months ago
Boundary detection based on supervised learning
— Detecting the boundaries of objects is a key step in separating foreground objects from the background, which is useful for robotics and computer vision applications, such as o...
Kiho Kwak, Daniel F. Huber, Jeongsook Chae, Takeo ...
KES
2008
Springer
13 years 7 months ago
Classification of Sporadic and BRCA1 Ovarian Cancer Based on a Genome-Wide Study of Copy Number Variations
Abstract. Motivation: Although studies have shown that genetic alterations are causally involved in numerous human diseases, still not much is known about the molecular mechanisms ...
Anneleen Daemen, Olivier Gevaert, Karin Leunen, Va...
IJSNET
2010
122views more  IJSNET 2010»
13 years 7 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga