Sciweavers

2097 search results - page 265 / 420
» Normalization in Support Vector Machines
Sort
View
COLT
2004
Springer
15 years 10 months ago
Sparseness Versus Estimating Conditional Probabilities: Some Asymptotic Results
One of the nice properties of kernel classifiers such as SVMs is that they often produce sparse solutions. However, the decision functions of these classifiers cannot always be u...
Peter L. Bartlett, Ambuj Tewari
ICIAR
2004
Springer
15 years 10 months ago
Learning an Information Theoretic Transform for Object Detection
We present an information theoretic approach for learning a linear dimension reduction transform for object classification. The theoretic guidance of the approach is that the trans...
Jianzhong Fang, Guoping Qiu
152
Voted
IEAAIE
2004
Springer
15 years 10 months ago
Data Mining Approach for Analyzing Call Center Performance
Abstract. The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classifi...
Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srin...
IJCNLP
2004
Springer
15 years 10 months ago
Deterministic Dependency Structure Analyzer for Chinese
In this paper, we present a deterministic dependency structure analyzer for Chinese. This analyzer implements two algorithms – Yamada and Nivre models – and two sorts of class...
Yuchang Cheng, Masayuki Asahara, Yuji Matsumoto
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 10 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...