Sciweavers

140 search results - page 15 / 28
» Regression with the optimised combination technique
Sort
View
NIPS
1996
13 years 9 months ago
Improving the Accuracy and Speed of Support Vector Machines
Support Vector Learning Machines (SVM) are nding application in pattern recognition, regression estimation, and operator inversion for ill-posed problems. Against this very genera...
Christopher J. C. Burges, Bernhard Schölkopf
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 8 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
ICPR
2008
IEEE
14 years 2 months ago
A method for removing cyclic artefacts in discrete tomography using latin squares
This paper presents a technique to remove image artefacts, formed under the cyclic additive group Zp, during the inverse Radon reconstruction from primedimensioned discrete projec...
Shekhar Chandra, Imants D. Svalbe
ICPR
2008
IEEE
14 years 2 months ago
Flexible object recognition in cluttered scenes using relative point distribution models
This paper introduces an edge-based object recognition method that is robust with respect to clutter, occlusion and object deformations. The method combines the use of local featu...
Alexandros Bouganis, Murray Shanahan
IH
1998
Springer
14 years 2 hour ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson