Sciweavers

988 search results - page 58 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
CEAS
2007
Springer
14 years 3 months ago
Asymmetric Gradient Boosting with Application to Spam Filtering
In this paper, we propose a new asymmetric boosting method, Boosting with Different Costs. Traditional boosting methods assume the same cost for misclassified instances from di...
Jingrui He, Bo Thiesson
ASPDAC
2007
ACM
96views Hardware» more  ASPDAC 2007»
14 years 28 days ago
A Novel Performance-Driven Topology Design Algorithm
This paper presents a very efficient algorithm for performance-driven topology design for interconnects. Given a net, it first generates A-tree1 topology using table lookup and net...
Min Pan, Chris C. N. Chu, Priyadarshan Patra
AUSDM
2006
Springer
136views Data Mining» more  AUSDM 2006»
14 years 20 days ago
Data Mining in Conceptualising Active Ageing
The concept of older adults contributing to society in a meaningful way has been termed `active ageing'. We present applications of data mining techniques on the active agein...
Richi Nayak, Laurie Buys, Jan Lovie-Kitchin
IBPRIA
2007
Springer
14 years 3 months ago
Estimation of Multiple Objects at Unknown Locations with Active Contours
Abstract. This paper presents an algorithm for the estimation of multiple regions with unknown shapes and positions using multiple active contour models (ACM’s). The algorithm or...
Margarida Silveira, Jorge S. Marques
ICRA
2005
IEEE
175views Robotics» more  ICRA 2005»
14 years 2 months ago
Trajectory Planning and Tracking Control of Underactuated AUVs
− This paper addresses the combined problem of trajectory planning and tracking control for underactuated AUVs moving on the horizontal plane. A reference feasible trajectory for...
Filoktimon Repoulias, Evangelos Papadopoulos