Sciweavers

2938 search results - page 576 / 588
» On obfuscating point functions
Sort
View
JCB
2002
70views more  JCB 2002»
13 years 7 months ago
Strong Feature Sets from Small Samples
For small samples, classi er design algorithms typically suffer from over tting. Given a set of features, a classi er must be designed and its error estimated. For small samples, ...
Seungchan Kim, Edward R. Dougherty, Junior Barrera...
JMIV
1998
112views more  JMIV 1998»
13 years 7 months ago
Differential and Integral Geometry of Linear Scale-Spaces
Linear scale-space theory provides a useful framework to quantify the differential and integral geometry of spatio-temporal input images. In this paper that geometry comes about by...
Alfons H. Salden, Bart M. ter Haar Romeny, Max A. ...
MONET
2002
162views more  MONET 2002»
13 years 7 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...
NAR
2002
109views more  NAR 2002»
13 years 7 months ago
The Molecular Biology Database Collection: 2002 update
The Molecular Biology Database Collection is an online resource listing key databases of value to the biological community. This Collection is intended to bring fellow scientists&...
Andreas D. Baxevanis
SIGKDD
2002
232views more  SIGKDD 2002»
13 years 7 months ago
The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing
In database marketing, data mining has been used extensively to find the optimal customer targets so as to maximize return on investment. In particular, using marketing campaign d...
Victor S. Y. Lo