Sciweavers

649 search results - page 66 / 130
» Some Methods of Replacing the Nearest Neighbor Method
Sort
View
ICMLA
2009
13 years 5 months ago
Text Classification Methodologies Applied to Micro-Text in Military Chat
We propose methods to classify lines of military chat, or posts, which contain items of interest. We evaluated several current text categorization and feature selection methodologi...
Kevin Dela Rosa, Jeffrey Ellen
JMLR
2010
367views more  JMLR 2010»
13 years 2 months ago
Locally Linear Denoising on Image Manifolds
We study the problem of image denoising where images are assumed to be samples from low dimensional (sub)manifolds. We propose the algorithm of locally linear denoising. The algor...
Dian Gong, Fei Sha, Gérard G. Medioni
ICASSP
2011
IEEE
12 years 11 months ago
Towards reduced false-alarms using cohorts
The focus of the 2010 NIST Speaker Recognition Evaluation (SRE) [1] was the low false alarm regime of the detection error trade-off (DET) curve. This paper presents several approa...
Zahi N. Karam, William M. Campbell, Najim Dehak
ICASSP
2011
IEEE
12 years 11 months ago
A metric approach toward point process divergence
Estimating divergence between two point processes, i.e. probability laws on the space of spike trains, is an essential tool in many computational neuroscience applications, such a...
Sohan Seth, Austin J. Brockmeier, José Carl...
ICDE
2011
IEEE
271views Database» more  ICDE 2011»
12 years 11 months ago
Authentication of moving kNN queries
— A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often...
Man Lung Yiu, Eric Lo, Duncan Yung